POPULARITY
In this week's episode of Parsing Immigration Policy, Senior Legal Fellow George Fishman explains that verifying Social Security numbers could be the solution to two issues: States' need for tools to help identify those eligible to vote in the United States and DHS's need for tools to uncover employers who are knowingly employing illegal aliens.Voter Eligibility VerificationExecutive Order: U.S. Citizenship and Immigration Services (USCIS) has announced that it will be giving states and localities the ability to check SSNs of individuals registering to vote and those already on the voter rolls to verify citizenship.History: Fishman reflects on his role in proposing this idea nearly three decades ago as part of the 1997 Voter Eligibility Verification Act. How it will work: State and local governments will be given access to federal databases through an upgrade of USCIS's Systematic Alien Verification for Entitlements system to confirm citizenship.Employment Eligibility VerificationNo-Match Letters: Although the administration has not announced any action on re-instating “no-match” letters, the SSA could revive the practice of notifying employers when a worker's Social Security number doesn't match the name listed in the SSA's database.History: The episode covers the history of no-match letters, including their origins, past implementations, and abandonment by the Obama and Biden administrations. Policy Recommendations: Fishman recommends that SSA resume issuing no-match letters and DHS reissue its regulations instructing employers that they may be found to know that they are employing illegal aliens if they don't take certain actions upon receipt of no-match letters.HostMark Krikorian is the Executive Director of the Center for Immigration StudiesGuestGeorge Fishman is the Senior Legal Fellow at the Center for Immigration Studies.RelatedThe Trump Administration is Empowering States to Verify Voters Citizenship“Preserving and Protecting the Integrity of American Elections”Reviving No-Match Letters: A powerful tool against illegal employmentIs the Harvard TRO Likely to be Effective?DHS Pulls Harvard's Student-Visa Certification AuthorityIntro MontageVoices in the opening montage:Sen. Barack Obama at a 2005 press conference.Sen. John McCain in a 2010 election ad.President Lyndon Johnson, upon signing the 1965 Immigration Act.Booker T. Washington, reading in 1908 from his 1895 Atlanta Exposition speech.Laraine Newman as a "Conehead" on SNL in 1977.Hillary Clinton in a 2003 radio interview.Cesar Chavez in a 1974 interview.House Speaker Nancy Pelosi speaking to reporters in 2019.Prof. George Borjas in a 2016 C-SPAN appearance.Sen. Jeff Sessions in 2008 comments on the Senate floor.Charlton Heston in "Planet of the Apes".
1. 500K Bitcoin Predictions & Market SentimentThe crew discussed the recent wave of bullish sentiment led by industry voices like Adam Back, Bitfinex analysts, and Vibes Capital. Adam Back predicts $500K–$1M this cycle, while Vibes Capital cites $100B in anticipated corporate treasury demand plus potential U.S. government Bitcoin buys. With consistent ETF inflows, particularly BlackRock's IBIT, and support levels holding near $100K, sentiment is peaking.2. Treasury Demand & Speculative Attack NarrativeMicroStrategy's playbook is now being followed by a growing list of public firms using debt and equity to acquire Bitcoin. The panel emphasized this as a "speculative attack" on fiat—unlocking Bitcoin exposure for capital pools that can't hold spot BTC directly. With more than 500,000 BTC already under corporate control, the race is on.3. Coinbase Hack: $400M FalloutA major hack at Coinbase leaked sensitive customer data (names, addresses, partial SSNs, balances, and IDs). While no private keys were exposed, the breach raised concerns about platform risk. The team praised Coinbase's $20M bounty offer but reiterated the importance of security hygiene and moving to self-custody solutions like Swan Vault.4. Digital Scarcity & FT FiascoFinancial Times drew ire for downplaying Bitcoin's innovation, comparing it to teeth. The panel explained how Bitcoin solved digital scarcity using proof-of-work and decentralized consensus. Lynn Alden's and Pierre Rochard's responses underscored the persistent misunderstanding from legacy media.5. Macroeconomics & Treasury PolicyThe group reviewed new U.S. spending legislation further widening deficits—echoing the "Nothing Stops This Train" meme. Tariff-driven inflation, CPI surprises, and Walmart's price hikes were also covered, with mixed views on future inflation trajectories.6. Global Adoption & Corporate MomentumRecent sovereign and institutional moves included Chinese and Indian firms acquiring BTC, 21.co's big buy, and Abu Dhabi's sovereign fund adding exposure. Meanwhile, Swan's own CIO Ben Workman emphasized the moral and fiduciary pressure mounting on corporate leaders to explore Bitcoin treasuries. Swan Private helps HNWI, companies, trusts, and other entities go beyond legacy finance with BItcoin. Learn more at swan.com/private. Put Bitcoin into your IRA and own your future. Check out swan.com/ira.Swan Vault makes advanced Bitcoin security simple. Learn more at swan.com/vault.
All Family Pharmacy https://allfamilypharmacy.com/HermanBe prepared for when you need medicine the most. Don't go to urgent care YUCK. Use code HERMAN10 to save 10% on your order. Alan's Soaps https://www.alansartisansoaps.comUse coupon code TODD to save an additional 10% off the bundle price.Bioptimizers https://bioptimizers.com/toddEnter promo code TODD to get 10% off your order of MassZymes today.Bizable https://gobizable.comUntie your business exposure from your personal exposure with BiZABLE. Get your free consultation at GoBizAble.com today. Bonefrog https://bonefrogcoffee.com/toddThe new GOLDEN AGE is here! Use code TODD at checkout to receive 10% off your first purchase and 15% on subscriptions.Bulwark Capital Bulwark Capital Management (bulwarkcapitalmgmt.com)Get a second opinion on the health of your retirement portfolio today. Schedule your free Know Your Risk Portfolio review go to KnowYourRiskRadio.com today.Renue Healthcare https://renue.healthcare/toddYour journey to a better life starts at Renue Healthcare. Visit https://Renue.Healthcare/ToddDOGE revealed the massive systemic fraud creating fraudulent SSNs. Trump's Liberation Day announcement was a good move, even when the Mockingbird Media would like to say otherwise...Episode Links:“Hopefully you're going to look back in years to come and say you know, he was right…this has turned out to be one of the most important days in the history of our country”Leftist protesters shut down access to the Tesla store in Manhattan by laying on the ground outside on March 29. They held up signs urging for Elon Musk to be shot and for more Tesla property to be firebombed.At Elon's Event in Wisconsin, He and His Team Revealed This Massive Fraud. God Cannot Bless This. - Elon Musk & Antonio Gracias.BREAKING: Treasury Secretary Scott Bessent just announced that they have effectively kneecapped the Sinaloa cartel! HUGE! “We leveled sanctions against 6 individuals and 7 entities involved in a money laundering operation, cutting off financing for these evil people."Watch: Rep. Andy Harris explains how the SAVE Act will close loopholes that allow noncitizens to vote. Only American citizens should vote in American elections. The majority of Americans agree.
DOGE: Biden illegally gave 6 million illegal immigrants social security numbers, signed millions up illegally for welfare, and some even voted. Plus, the forgotten federal agency where employees lived like royalty. (Please subscribe & share.) Sources: https://x.com/WallStreetApes/status/1906526419079082173 https://pjmedia.com/catherinesalgado/2025/03/20/the-doge-ed-agency-whose-employees-lived-like-kings-n4938104
Get the stories from today's show in THE STACK: https://justinbarclay.comKirk Elliott PHD - FREE consultation on wealth conservation - http://GoldWithJustin.comJoin Justin in the MAHA revolution - http://HealthWithJustin.comTry Cue Streaming for just $2 / day and help support the good guys https://justinbarclay.com/cueUp to 80% OFF! Use promo code JUSTIN http://MyPillow.com/JustinPatriots are making the Switch! What if we could start voting with our dollars too? http://SwitchWithJustin.com
The opening monologue deal with the essence of playing trivia. I use this backdrop to frame so much of what is happening in our world and how so many people are so sure of things that are just not true. I think we should all govern ourselves on how much we “know” versus how much we “believe” we know. We move to a comment from Peter St. Onge about the economy and how the Left is suddenly more focused on pushing “soft” data versus “hard” economic data. We this dive into a piece by Victor Davis Hanson about Donald Trump his his attempt to wage this counter-revolution against all that has come before, especially the last 20 years since Obama pledged to fundamentally transform our country. The United States isn't the only Western democracy practicing lawfare, Democrats are just not as good at it as some of our other European allies. Marine LePen seems to be the latest victim of this disturbing trend among populists. To add to the cultural divide between the US and the UK, it seems a 3-4 year old was dismissed from the nursery because they “misgendered” another toddler. It's stunning to see how far the Woke mind-virus has spread. We then spend some time with a presentation shared over the weekend by Elon Musk and Antonio Gracias. They found the proof of what I have been stating for years about the Democrat party's intentions to create a permanent underclass of voters by opening the floodgates at our southern border. I close with a reminder that we have to be patient with AG Bondi and FBI Director Patel. They will not be afforded the luxury of mistakes or missed steps. They won't even be believed for a truthful case. They need a case to rock-solid and airtight that it will defy all attempts by the Left to paint it as nothing more than political retribution. Please take a moment to rate and review the show and then share the episode on social media. You can find me on Facebook, X, Instagram, GETTR, TRUTH Social and YouTube by searching for The Alan Sanders Show. And, consider becoming a sponsor of the show by visiting my Patreon page!!
Recently there was some online complaints about social security numbers (SSNs) in the US being duplicated and re-used by individuals. This is really political gamesmanship, so ignore the political part. Just know that social security numbers appear to be one of the contenders used in many data models. I found a good piece about how SSNs aren't unique, and have a mess of problems. Despite this, many people seem to want to use SSNs as a primary or alternate key in their database systems. They also aren't well secured in many systems, even though we should consider this sensitive PII data. Read the rest of A Poor Data Model
Anti-trigger warning: Doug and Strickland don't talk about politics AT ALL this episode! The US government is a dumpster fire, Elon Musk has given all of your SSNs to 3 kids with no security clearance who are not even old enough to drink, and the NFL has taken "End Racism" out of the end zones for the Super Bowl because...Well, I guess that idea could possibly be offensive to our President, who knew? Anyway, I wanted to give you an update on all that since the boys didn't today. Hold on, are you upset because the notes didn't give you any clue as to what Doug and Strick will be talking about today? How is that different from any other Friday Fuckery show?Do you want some cool merch? Check out the store here- https://www.niceguysonbusiness.com/merch Leave a voicemail for the Nice Guys: 424-2DJ-DOUG - (424) 235-3684Need help podcasting? www.TurnkeyPodcast.comJoin our Nice Guys Community. www.NiceShortCut.com No time to get to this, but you can read the blog here: 12 Worries Every Entrepreneur Has (or they are lying) Show notes written lovingly by the most anonymous man (or woman) in the world. Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.
Welcome to today's episode of AI Lawyer Talking Tech, where we dive into the stories and trends redefining the legal industry through technology. From groundbreaking AI tools fueling next-generation law firms to major regulatory shifts reshaping data privacy and innovation, today's discussion captures the pulse of transformation in legal tech. We'll also spotlight the innovators competing to become the “Next Big Legal Tech Startup” at ABA TECHSHOW 2025 and explore the implications of multi-million-dollar investments in AI-powered platforms. Join us as we unpack these developments and more, showcasing the exciting future of law in a tech-driven world. Vote Now for the Next Big Legal Tech Startups at ABA TECHSHOW 2025!16 Jan 2025Legaltech on MediumLegal AI Platform Eve Secures $47 Million to Fuel Era of AI-Native Law Firms16 Jan 2025Legal Technology News - Legal IT Professionals | Everything legal technologyAlejandro Sánchez del Campo: “We are in the best moment in history for lawyers”16 Jan 2025Golbal Legal Tech HubBiden Administration Releases Executive Order Advancing Artificial Intelligence16 Jan 2025Barnes & ThornburgUSPTO Issues Artificial Intelligence Strategy Outlining the Goals for AI Usage Within Agency Operations16 Jan 2025Lathrop GPMAI's New Laws + Traditional Issues16 Jan 2025Jackson LewisCFPB Explores Options for Bringing Digital Payments Providers Under Privacy and Payments Laws16 Jan 2025CooleyBiden Administration Issues More Restrictions on Advanced Chips and AI Models16 Jan 2025OMelveny & Myers LLPArtificial Intelligence – 2024 Year in Review16 Jan 2025Kramer LevinAI On the Prize: Decoding FDA's Latest Guidance15 Jan 2025Venable LLPTackling deepfake abuse: Legal consequences and emerging protections17 Jan 2025London Daily NewsBaker McKenzie Advises Gulf Data Hub on Strategic Partnership with KKR to Expand One of the Largest Independent Data Center Platforms in the Middle East17 Jan 2025Baker & McKenzieLegal Toolkit Jared's Xennial Trauma Dump || The Past & Future of Legal Tech17 Jan 2025Legal Talk NetworkNintendo admits emulators are legal after years of killing emulators17 Jan 2025KnowTechieSwiss Arbitration Summit – Shaping the Future of Arbitration Together: Extension of Arbitration Clauses to Non-signatories and AI in Practice17 Jan 2025Kluwer Arbitration BlogInternational Privacy & Cybersecurity Legal Update17 Jan 2025National Law ReviewMastering E-Discovery, Legal Tech, and Herding Digital Cats at Your Firm16 Jan 2025Paralegal Voice Podcast - Legal Talk NetworkCalifornia Attorney General Issues Two Advisories Summarizing Law Applicable to AI16 Jan 2025National Law ReviewProminent US law firm Wolf Haldenstein disclosed a data breach16 Jan 2025Security AffairsSupreme Court weighs Texas age verification law for adult websites16 Jan 2025Newsbug.InfoStretto Selected As Restructuring Service Of The Year In 19th Annual Turnaround Awards16 Jan 2025Stretto3.5 million hit in major law firm data breach — full names, SSNs, dates of birth, addresses and more exposed16 Jan 2025Toms NetworkingCalifornia AG Issues AI-Related Legal Guidelines for Developers and Healthcare Entities16 Jan 2025National Law ReviewSequoia Capital in talks to lead $300M round for Harvey at $3B valuation16 Jan 2025MSN United StatesDrake's Label UMG Responds to His Lawsuit With the Most Obvious Clapback Ever...and So Does Black Twitter16 Jan 2025Yahoo EntertainmentKey Legal Challenges for Business Lawyers in New York, 202516 Jan 2025TechBullionFive challenges for the legal sector in 202516 Jan 2025Law SocietyHow AI is transforming the legal profession (2025)16 Jan 2025Thomson ReutersExclusive: Syntheia's New Product Brings AI-Powered Document Analysis to Lawyers' Email Workflows16 Jan 2025LawSitesTri-City legal experts weigh in on state's effort to innovate legal services16 Jan 2025Tri-Cities Area Journal of Business
In the first of two podcast episodes on the State of the US Navy as it (and a troubled world) sail into 2025, guest Dr Emma Salisbury chats with host Iain Ballantyne They look first of all at areas Emma wrote about in the recently published Warships IFR ‘Guide to US Navy 2025', namely: the USA's ‘shipbuilding woes'; the future size and composition of the USN; the US Navy and AUKUS - is it mission impossible? And is there a solution for the latter - enabling the AUKUS project to survive - should it be impossible to provide the Australians with Virginia Class attack submarines (SSNs) off American production lines? Among other topics discussed are the impact of the second Trump presidency (as the new POTUS takes office in January 2025). Also, what kind of message is the UK sending to the USA by cutting naval vessels ahead of its own defence review? Emma and Iain look at how US Navy anti-missile and drone defences may evolve and other topics include the elephant in the room - the future of NATO, and whether or not President Trump will pull the USA out of the Alliance. The importance of drones and how they might enhance American naval mass and global presence is weighed up, along with how important the US Navy is to us all. To obtain the ‘Guide to the US Navy' https://warshipsifr.com/news/guide-to-the-us-navy-2025/ And please check out the latest edition of the monthly magazine. For print subscriptions: https://sundialmedia.escosubs.co.uk/subscribe/warships.htm For digital subscriptions: https://bit.ly/Wdpm * Dr Emma Salisbury is a fellow at the Council on Geostrategy, specialising in naval matters, defence-industrial policy, and military procurement. She recently completed her PhD with a dissertation focused on the history of the US military-industrial complex. She is also a senior staffer for a UK Member of Parliament and an assistant editor at War on the Rocks. Follow her on X @salisbot * Iain Ballantyne is the founding and current Editor of Warships IFR (first published in 1998) along with its ‘Guide to the Royal Navy' (since 2003) and ‘Guide to the US Navy' (since 2018). Iain is also author of the books ‘Hunter Killers' (Orion) and ‘The Deadly Trade' (Weidenfeld & Nicolson), both about submarine warfare, plus ‘Arnhem: Ten Days in The Cauldron' and ‘Bismarck: 24 Hours to Doom' (published by Canelo). In 2017 Iain was awarded a Fellowship by the British Maritime Foundation, which promotes awareness of the United Kingdom's dependence on the sea and seafarers. Visit his web site Bismarckbattle.com and follow him on X @IBallantyn
For review:1. US CENTCOM Release:- US Forces assigned to CENTCOM strike ISIS camps in Syria resulting in 35 operatives killed.- B-52 Stratofortress Bombers arrive in CENTCOM AOR from Minot Air Force Base, North Dakota from the 5th Bomb Wing.2. Israeli Commando Raid in Northern Lebanon.According Al-Akhbar report, operatives from the Navy's Shayetet 13 commando unit captured suspected Hezbollah Naval Official, some 140 kilometers (87 miles) north of Israel's maritime border with Lebanon.3. IDF captures Syrian man conducting surveillance for Iran.Israeli commandos recently carried out a raid in southern Syria where they captured a Syrian man who was allegedly carrying surveillance operations on the border on behalf of Iran. The raid in Syria was carried by the Egoz commando unit, along with field interrogators of the Intelligence Directorate's Unit 504.4. Iran President (Masoud Pezeshkian) says that a ceasefire between Israel and Iranian allies- "could affect the intensity" of retaliation.5. On the border with Lebanon, Israeli PM Benjamin Netanyahu: "with or without an agreement” with Lebanon, restoring security in the north and returning residents to their homes requires pushing Hezbollah north of the Litani River, preventing the terror group from rearming and responding to any activity against Israel.6. Axios Report: US tells Iran (through Switzerland), "We won't be able to hold Israel back, and we won't be able to make sure that the next attack will be calibrated and targeted as the previous one.”7. US Security Assistance Package to Ukraine Worth $425 Million - Includes 200 Stryker Combat Vehicles.8. Lithuania provides new military assistance package to Ukraine- including electricity generators, ammunition, and mortar rounds. The Lithuanian Defense Ministry said that the equipment is expected to reach Kyiv this week. Lithuania has already donated 155 mm ammunition, M113 armored personnel carriers, anti-drone systems, and drones this year.9. North Korea's Foreign Minister visits Moscow. NK FM Choe Son Hui: “We will always stand firmly by our Russian comrades until victory day,” Choe declared in Moscow after talks with her Russian counterpart Sergei Lavrov.10. India Procures 31 x US-Built MQ-9B Drones in deal worth $3.8 billion.11. India to develop attack submarine fleet. India is now working on a new class of attack submarines (SSN) after the government approved US$4.8 billion for the construction of an initial two 6,000-ton boats, and that an eventual six SSNs in this class are planned for the Indian Navy.
This week on the Retirement Quick Tips Podcast, I'm talking about: Fortify Your Data & Protect Yourself From Cyber Crime Today, I'm talking about checking & freezing your credit as one of the key ways to protect yourself against cyber fraud after the massive data breach that just exposed millions of Americans' names, addresses, and SSNs.
Another day, another major data breach. Reported as 3 billion records and actually being released back in April, hackers stole a lot of information on most people in the US, Canada, and the UK. We'll examine what happened and explain how you can check how much of your data is now out there. Once past that joyous story, we'll get into all the other tech news along with some tips and picks to help you tech better! Watch on YouTube! INTRO (00:00) MAIN TOPIC: Massive Data Leak of SSNs and more (04:50) Data leak affecting everyone in the US, UK, and Canada was even worse than we thought Check your info - npd.pentester.com haveibeenpwned.com Inside the "3 Billion People" National Public Data Breach - Troy Hunt DAVE'S PRO-TIP OF THE WEEK: Easier Macro with iPhone Magnifier (15:40) JUST THE HEADLINES: (21:00) Teen builds his own nuclear fusion reactor at college Chess player suspended after allegedly poisoning her rival The English Premier League will ditch its hated video-assisted referee tech for fleet of iPhones Study finds 94% of business spreadsheets have critical errors Apple aiming to launch tabletop robotic home device as soon as 2026 with pricing around $1,000 Ikea's stock-counting warehouse drones will fly alongside workers in the US Cheating Scandal Rocking the World of Elite High-School Math TAKES: Elon Musk's xAI releases Grok-2, adds image generation on X (23:20) Procreate's anti-AI pledge attracts praise from digital creatives (26:55) Google threatened tech influencers unless they ‘preferred' the Pixel (31:20) Vulnerability in Microsoft apps allowed hackers to spy on Mac users (36:25) T-Mobile fined $60M for unauthorized access to data, the largest fine of its type (38:40) BONUS ODD TAKE: Saudi man earns world record for 444 game consoles hooked to one TV (40:35) PICKS OF THE WEEK: Dave: Meta Ray-ban Smart Glasses (45:10) Nate: ZipChill Instant Beverage Spinner Chiller, Universal Can Cooler for Drinks, Rapidly Chills Beer and Soda Cans in 60 Seconds, No Batteries Required, Lightweight Small Portable (53:55) RAMAZON PURCHASE - Giveaway! (59:15) Find us elsewhere: https://notpicks.com - Find links to previous picks of the week https://notnerd.com - All things Notnerd
Peace and Blessings to you all tuning in to another UnTitled.UnEdited episode. Hope you all had a great week. Had to dive in and drop our thoughts on some of the foolery going on, we got everyone SSNs being hacked into and leaked, we got people being charged cover fees to get into weddings, and we got a lady scamming a million dollars worth of chicken wings...wow. Tap in to this episode, laugh with us for a little and we will see you guys next week!
Hour 4 - Reports are saying over 2 billion people's information was stolen in a government hack.
Hackers leaked 2.7 billion records from National Public Data, including SSNs. What does this mean for you? Plus, dynamic pricing at grocery stores, Google's new game-changing updates, and Ford's latest 'do not drive' alert.
Hackers may have leaked the Social Security Numbers of every American, now it's Democrats who want the House to investigate X for political censorship, and Opera's AI-focused web browser One is now on iOS. It's Wednesday, August 14th and this is Engadget News. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Hackers leaked 2.7 billion records from National Public Data, including SSNs. What does this mean for you? Plus, dynamic pricing at grocery stores, Google's new game-changing updates, and Ford's latest 'do not drive' alert.
Hold on to your wallets, SSNs, and test papers. This episode is all about scams, schemes, and con artists. Student hijinx, famous grifts, monkey business, and the word of God. This episode is hosted by Jay Allison, producer of this radio show.Storytellers:Abigail Ladd runs a con in elementary school.Tonya Camille and her sister use their physical similarities to their advantage.Pete Goldfinger experiences a famous scandal firsthand.Gayliene Omary has a run in with a scammer of the heart.Maria Corrales confronts a con in the animal kingdom.Chiwoza Bandawe receives the word of God, courtesy of a shady acquaintance. Podcast: 879
Biden/Trump ticket vows to defeat Zelensky, Florida government leaks SSNs & medical records for millions, FBI illegally covers up massive AT&T hack, “COVID Part II: Birds of Prey” coming soon, Israel killing kids with US weapons and both sides hiding it, cops pissed paraplegic wouldn't step out of vehicle, and our Pavlovian response to manufactured outrage.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode, host Dev Goswami and defence expert Shiv Aroor delve into India's nuclear submarine program, discussing its limited fleet despite a vast coastline of 6700 km. Why does a country with such a significant maritime border suffer from "sea blindness"? The Indian Navy, the smallest among the three armed forces, seems disproportionally under-equipped given the strategic importance of its maritime domain. So, what factors contributed to this stagnation?India currently boasts only two nuclear submarines, INS Arihant and INS Arighat. But what sets nuclear submarines apart from their conventional and diesel-electric counterparts?Consider this a masterclass on the SSBNs (nuclear-powered ballistic missile submarines) and SSNs (nuclear-powered attack submarines).In February 2015, the Indian government approved the indigenous construction of six SSNs at the Ship Building Center (SBC) in Visakhapatnam. But we have yet to hear much about these projects since then. The absence of a nuclear-powered attack submarine in India's fleet has significant strategic implications. Why hasn't India yet commissioned one despite the urgency?Tune in!Produced by Anna PriyadarshiniSound mix by Sachin Dwivedi
In this episode, the hosts discuss a data breach at a government consulting firm where hackers stole over 340,000 social security numbers. They speculate on the cause of the breach and the potential implications. They also highlight the need to move away from using social security numbers as identifiers and suggest alternative solutions. The hosts emphasize the importance of protecting personal information and the potential consequences for companies that fail to do so. Please LISTEN
Topic begins at (0:23:06) mark: Dodgers slugger Shohei Ohtani in massive controversy regarding illegal gambling payments from his account.... (1:49:29): Peter Jetten wins arbitration against Tom Dwan, then deletes tweet crowing about it.... (2:10:38): Tropicana Las Vegas closes, Druff visits and gambles during final few hours.... (2:26:02): Oakland A's will play in Sacramento for next 3 years, perhaps longer, as they wait for Vegas situation to resolve.... (2:33:12): Ryan DePaulo fired from ACR, expresses irritation about it publicly.... (2:51:22): WPT Cruise seen as success, Druff recalls iconic 2006 Party Poker cruise.... (3:34:27): Update: New info released regarding last year's MGM hack which impacted operations for weeks.... (3:44:37): Shaun Deeb's Twitter hammered by thousands of bots, with his and wife's SSNs, as possible retaliation for critical tweets.... (3:54:15): UC Berkeley professor under fire for posting, "If you want a girlfriend, get out of the Bay Area".... (4:33:09): Poker.org in controversy for the second time this year, this time inadvertently promoting a magazine by Mike Postle's friend.... (4:59:27): Las Vegas lawyer, wife shot dead by wife's former father-in-law, who was another attorney.... (5:08:57): Report: Philadelphia highway shooting, where shooter got hit by car while fleeing on foot, was a poker debt collection gone bad.... (5:15:15): Founders Card has apparently resolved its issues with Caesars, and is giving out Diamond status again.... (5:18:43): Druff plays at Fontainebleu Las Vegas, notices some recent changes to their games and point accumulation methods.... (5:31:20): Wynn Las Vegas doing status match through late May.... (5:44:20): Commerce Casino announced as location of 2024 WSOP Tournament of Champions, causing controversy.... (5:53:35): GGPoker and Russian PokerOK skin cause controversy after going to war against "stables".... (6:06:10): Twitter influencer "Vegas Starfish" steals Vegas Casino Talk content for one of her videos.
Topic begins at (0:23:06) mark: Dodgers slugger Shohei Ohtani in massive controversy regarding illegal gambling payments from his account.... (1:49:29): Peter Jetten wins arbitration against Tom Dwan, then deletes tweet crowing about it.... (2:10:38): Tropicana Las Vegas closes, Druff visits and gambles during final few hours.... (2:26:02): Oakland A's will play in Sacramento for next 3 years, perhaps longer, as they wait for Vegas situation to resolve.... (2:33:12): Ryan DePaulo fired from ACR, expresses irritation about it publicly.... (2:51:22): WPT Cruise seen as success, Druff recalls iconic 2006 Party Poker cruise.... (3:34:27): Update: New info released regarding last year's MGM hack which impacted operations for weeks.... (3:44:37): Shaun Deeb's Twitter hammered by thousands of bots, with his and wife's SSNs, as possible retaliation for critical tweets.... (3:54:15): UC Berkeley professor under fire for posting, "If you want a girlfriend, get out of the Bay Area".... (4:33:09): Poker.org in controversy for the second time this year, this time inadvertently promoting a magazine by Mike Postle's friend.... (4:59:27): Las Vegas lawyer, wife shot dead by wife's former father-in-law, who was another attorney.... (5:08:57): Report: Philadelphia highway shooting, where shooter got hit by car while fleeing on foot, was a poker debt collection gone bad.... (5:15:15): Founders Card has apparently resolved its issues with Caesars, and is giving out Diamond status again.... (5:18:43): Druff plays at Fontainebleu Las Vegas, notices some recent changes to their games and point accumulation methods.... (5:31:20): Wynn Las Vegas doing status match through late May.... (5:44:20): Commerce Casino announced as location of 2024 WSOP Tournament of Champions, causing controversy.... (5:53:35): GGPoker and Russian PokerOK skin cause controversy after going to war against "stables".... (6:06:10): Twitter influencer "Vegas Starfish" steals Vegas Casino Talk content for one of her videos.
Hosts: HutchOn ITSPmagazine
Legislation has now passed the US Congress putting in place a framework for AUKUS Pillar One. Does this mean that Australia will be acquiring second hand Virginia class submarines? No, it does not. In fact some of the wording is so vague that a future US President could cancel the deal on a personal whim. Secondly, the industrial mobilisation problems are vast – and thirdly if anyone says AUKUS is safe from political changes because of bipartisan support in the US then they must be on drugs. Currently, US military aid to both Israel and Ukraine is being held hostage to demands from Republicans to fund the wall with Mexico – and Australia is no different. Also a lot of nonsense has been spoken about Virginias – they are not the best SSNs in the world. There are at least two other designs that are better. Finally – helicopters. What a travesty that Australia will spend $11 billion on previous generation machinery, without scrutiny, just to keep a handful of Army officers happy. Hosted on Acast. See acast.com/privacy for more information.
In this weeks OVERREACTION MONDAY: Does ChatGPT Save Data? What You Need to Know Massive Healthcare Data Breach Exposes Full Names, SSNs, and More of 9 Million Patients - What Now?Unveiling the Privacy Intrusions: Apps That Could be Watching You Support the show
In this week's Security Sprint, Dave and Andy discussed the following topics: Gate 15 is on Threads! @gate_15_resilience Jacksonville Murders and other physical security updates. Gunman Kills 3 in Racially Motivated Attack on Jacksonville Dollar Store Jacksonville gunman was turned away from historically Black university before killing 3 in racist shooting at nearby store, authorities say Ryan Palmeter, Dollar General Suspect: 5 Fast Facts You Need to Know Ryan Palmeter Video: Dollar General Suspect Video Released Jacksonville Gunman Used Gun With Swastika on It to Kill 3 in Racist Attack, Police Say At least seven injured in shooting at Caribbean parade in Boston. Safeguarding The US Space Industry; Keeping Your Intellectual Property In Orbit (PDF). “Foreign intelligence entities recognize the importance of the commercial space industry to the US economy and national security, including the growing dependence of critical infrastructure on space-based assets." OODA Loop: What To Do About The U.S. Intelligence Community Warning on Safeguarding The Space Industry. Axios: Space is the next cybersecurity frontier Scientists Still Looking For Reasons Cybercriminals Are Disabling These Space Telescopes Space ISAC Swatting and Doxxing. Keep what you want, add what you want. Bomb threat at a Forest Park church induced panic, police say Threats against public officials on the rise as 2024 nears Surrenders and threats of arrest ahead of Trump's booking in Georgia Bumbling alleged arsonist sets himself ablaze trying to burn down Florida church Trump's Georgia arraignment expected to be televised, Fulton County judge says 3 killed, 6 injured in mass shooting at Orange County biker bar Bomb threat at Fulton County Courthouse after Trump arrest: report PSA: FEMA and FCC Plan Nationwide Emergency Alert Test for 04 Oct 2023. The Federal Emergency Management Agency, in coordination with the Federal Communications Commission, will conduct a nationwide test of the Emergency Alert System (EAS) and Wireless Emergency Alerts (WEA) on Oct 4 at 2:20 p.m. FCC's Public Notice EMR-ISAC InfoGram Aug. 24 – S&T report evaluates gunshot detection technology for first responders; Nationwide emergency alert test on Oct. 4 Radio World Quick Hits Idalia Intensifying and Forecast to Become a Major Hurricane. NHC issuing advisories for the Atlantic on Hurricane Franklin and TS Idalia Governor Ron DeSantis Issues Updates on Tropical Storm Idalia Key Messages regarding Tropical Storm Idalia Tropical Storm Franklin leaves a body count and damage in the Caribbean 7 tornadoes confirmed as Michigan storms down trees and power lines; 5 people killed USG Updates TLP:CLEAR FBI FLASH: Suspected PRC Cyber Actors Continue to Globally Exploit Barracuda ESG Zero-Day Vulnerability CISA, NSA & NIST: Quantum-Readiness: Migration to Post-Quantum Cryptography FBI PSA - FBI Guidance for Cryptocurrency Scam Victims Of possible interest The Cheap Radio Hack That Disrupted Poland's Railway System UK air traffic control experiencing 'technical issue' Elon Musk stopped policing political misinformation Ransomware MOVEit, the biggest hack of the year, by the numbers Banning Ransomware Payments Brings New Challenges. With references to our friends Silas Cutler and eCrime! Surge in Cybercrime: Check Point 2023 Mid-Year Security Report Reveals 48 ransomware groups have breached over 2,200 victims Rhysida claims ransomware attack on Prospect Medical, threatens to sell data Thousands have SSNs leaked after ransomware attack on Ohio state archive org Connecticut hospital nurse says ransomware attack has affected payroll From Russia and Ukraine, with love Statement from President Joe Biden on Ukraine Independence Day THE CYBERSECURITY 202 - Without Prigozhin, expect some changes around the edges on Russian influence operations Intentional explosion downed Prigozhin's plane, says US intelligence
In the second and final installment of our discussion with British submarine captain Commander Rob Forsyth, we hear how a hard-charging Soviet spy vessel forced him to order HMS Repulse to ‘crash dive'. It happened as the Polaris missile submarine deployed from Scotland on a deterrent patrol in the early 1970s. With the UK and its NATO allies locked in the Cold War confrontation with the Soviet Union and Warsaw Pact, it was vitally important the best of the best became submarine captains, able to take such split-second, life-or-death decisions at sea. And so Rob Forsyth also tells Warships Pod host Iain Ballantyne about the tough job of being a Perisher course ‘Teacher', deciding who had the right stuff to command a Royal Navy submarine against the Soviets. Next, we hear how Rob was given command of the new Swiftsure Class nuclear powered hunter-killer submarine HMS Sceptre in the late 1970s. Aside from bringing the SSN into service and through sea trials, Rob was given a mission in the Mediterranean to find and trail a Russian Navy aircraft carrier and gather vital intelligence. Among other things Iain and Rob discuss are latter day developments such as the AUKUS defence pact between Australia, the UK and USA that will see a new generation of submarines constructed for both the Royal Navy and Royal Australian Navy. Rob and Iain also ponder whether or not a return of diesel-electric submarines in the British fleet is a means to relieve the operational strain on a small number of SSNs. Rob considers whether, in light of Russia's invasion of Ukraine, nuclear deterrence still works today, especially when conventional UK and NATO forces have arguably declined too far. • Follow Rob Forsyth on Twitter @RStanleyForsyth • Iain Ballantyne is the Editor of WARSHIPS International Fleet Review magazine. For more details on the magazine http://bit.ly/wifrmag Warships IFR is a monthly naval news magazine, also packed with commentary and analysis and offering a dash of naval history and culture. Available from shops and direct from the publisher. Follow it on Twitter @WarshipsIFR and Facebook @WarshipsIFR Iain Ballantyne can be found on Twitter @IBallantyn • To find out more about the Royal Navy's submarines and submariners during the Cold War at sea, including the exploits of Cdr Forsyth, read the book ‘Hunter Killers' by Iain Ballantyne. More details here https://iainballantyne.com/hunter killers/
Welcome to another episode of Category Visionaries — the show that explores GTM stories from tech's most innovative B2B founders. In today's episode, we're speaking with Naftali Harris, Co-Founder & CEO of SentiLink, an identity verification platform that's raised $85 Million in funding. Here are the most interesting points from our conversation: Founding Story: Naftali and his co-founder Max discovered a massive fraud problem while working at Affirm, leading them to create SentiLink to solve identity verification issues. Initial Insight: They encountered multiple fraudulent credit applications with the same name and birthdate but different SSNs, highlighting a gap in existing identity verification systems. Market Impact: SentiLink works with seven of the top 15 US banks, five of the ten largest credit unions, and over 300 financial institutions, processing over a million identity verifications daily. Core Values: The company's core values, especially "follow through," play a critical role in building trust with partners and ensuring operational excellence. Long-Term Vision: SentiLink aims to be the default solution for identity verification, similar to how CRMs are used in sales, addressing the fundamental question of "Who are you?" Fraud Evolution: Identity fraud evolves in waves, presenting both challenges and opportunities for SentiLink to continuously innovate and adapt their solutions. // Sponsors: Front Lines — We help B2B tech companies launch, manage, and grow podcasts that drive demand, awareness, and thought leadership. www.FrontLines.io The Global Talent Co. — We help tech startups find, vet, hire, pay, and retain amazing marketing talent that costs 50-70% less than the US & Europe. www.GlobalTalent.co
API attacks are on the rise and Noname Security is now there to help eliminate API problems and vulnerabilities. Michele Shear, Director of Channels and Filip Verloy, Field CTO speak with Don Witt of The Channel Daily News to discuss their technology and their commitment to the channel. Filip Verloy First, Filip provides a solid overview of the company's technology and then Michele discusses their channel-led channel-first company philosophy. Noname Security woks with their partners to both educate and enable them to show the Noname strategic value to their current and prospective customers. Listen in to Michele and Filip as they discuss the many features of the technology and then provide insight into how those features will enable companies to stay ahead of the API attackers. About: Noname data classification capabilities provide visibility into the types of data that traverse your APIs. Quickly identify how many APIs can access credit card data, phone numbers, SSNs, and other sensitive data. Research from IBM X-Force indicates that two-thirds of API security incidents are due to misconfigured APIs. By gaining a complete view of your APIs, infrastructure, and vulnerabilities, you can act first and stay ahead of attackers. API inventory is more than just the number. Gain visibility into which gateway the API passes through, when the API was last updated, the data type being accessed, and the number of users accessing the API. For more information, go to: https://nonamesecurity.com/ or call 1-312-375-4716
On this Back Story Dana Lewis speaks to UK (Ret) Rear Admiral John Gower, who says Russia is increasing the nuclear threat level as President Putin pledged to move tactical nuclear weapons to neighbouring Belarus.Gower also speaks about why nuclear submarines for Australia are needed, but cautions about why arming those SSNs with cruise missiles, if indeed the U.S. proceeds with rearming it's cruise missile arsenal with nuclear warheads raises risks.And in Kyiv, Valeriia Kolomiiets, Deputy Minister of Justice of Ukraine for European Integration says the Wagner Group fighting for Russia, is in her view committing war crimes. She discussed the many war crimes being investigated by a European tribunal, and the Int. Criminal Court in the Hague.
The Cybercrime Magazine Podcast brings you daily cybercrime news that airs each day on WCYB Digital Radio, the first and only 7x24x365 Internet radio station devoted to cybersecurity. Our host Hillarie McClure keeps you on the cutting edge of cyber with a rundown of the latest cyberattacks, hacks, data breaches, and more. Don't miss an episode! Airs every half-hour on WCYB and every day on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news
Welcome to Cyber Briefing, a short newsletter that informs you about the latest cybersecurity advisories, alerts and incidents every weekday. First time seeing this? Please subscribe. Hello World! It's February 06, 2023. Welcome to a new edition of Cyber Briefing by CyberMaterial. Let's review the latest cybersecurity alerts, advisories and incidents. Cyber Alerts Massive ransomware campaign targets VMware ES Xi Servers New Android banking trojan targeting Brazilian financial institutions GoAnywhere secure managed file transfer software have been warned about a zero-day exploit Hackers posing as Ukrainian Ministry deploy info stealers Serious security hole plugged in infosec tool #binwalk Cyber Incidents TruthFinder, Instant Checkmate confirm data breach affecting 20M customers Data breach at VICE News Media involved SSNs, financial info Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT Tallahassee Memorial HealthCare, Florida, has taken IT systems offline after cyberattack Cyber Advisory Cisco releases security advisories for multiple products VMware published a security advisory to address a critical vulnerability
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is sponsored by Deloitte Cyber. To learn more about our sponsor, visit https://deloitte.com/cyber • For more breaking news, visit https://cybercrimewire.com
ChatGPT's Technology Will Be Part of Everything This Year https://craigpeterson.com/artificial-intelligence-2/chatgpt/chatgpts-technol…ything-this-year/38570/ ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to create plausible-sounding fan fiction about Harry Potter and the Avengers. The latest development in this field is ChatGPT's ability to generate paragraphs, full-length sentences, and even paragraphs. In addition, the system can produce coherent text up to a certain length (currently between 10 and 15 sentences) that humans can read without difficulty—far superior to previous attempts at doing so. ++++++++ How AI chatbot ChatGPT changes the phishing game https://craigpeterson.com/artificial-intelligence-2/chatgpt/how-ai-chatbot-c…he-phishing-game/38572/ ChatGPT could be used for more than just helping your business get more leads or customers; it could also be used as an effective tool by phishers seeking access to confidential information from unsuspecting victims who are fooled into thinking they're talking with an actual human being through email or SMS messaging apps like WhatsApp or Telegram Messenger (both popular messaging platforms). We are very excited about ChatGPT and its potential to disrupt the phishing game. If it becomes widespread, it could be a game-changer for cybercriminals. In addition, Microsoft has shown us they are serious about investing in AI technology, so we would not be surprised if they developed their version of this technology in-house or acquired the company behind ChatGPT to ensure their customers stay safe online. Microsoft Looking to Invest $10 billion More Microsoft, which is rumored to be weighing a $10 billion investment in OpenAI on top of an earlier $1 billion commitment, is betting that the company is worth a lot more—despite the fact neither ChatGPT nor other AI models made by OpenAI are yet raking in vast amounts of cash. ++++++++ LifeLock… Norton LifeLock Password Accounts Hacked https://www.bleepingcomputer.com/news/security/nortonlifelock-warns-that-hackers-breached-password-manager-accounts/ In accessing your account with your username and password, the unauthorized third party may have viewed your first name, last name, phone number, and mailing address — Norton LifeLock For customers utilizing the Norton Password Manager feature, the notice warns that the attackers might have obtained details stored in the private vaults. Cars… Millions of Vehicles at Risk: Vulnerabilities found in 16 Major Car Brands https://thehackernews.com/2023/01/millions-of-vehicles-at-risk-api.html The security vulnerabilities were found in the automotive APIs powering Acura, BMW, Ferrari, Ford, Genesis, Honda, Hyundai, Infiniti, Jaguar, Kia, Land Rover, Mercedes-Benz, Nissan, Porsche, Rolls Royce, Toyota, as well as in software from Reviver, SiriusXM, and Spireon. The flaws run a wide gamut, ranging from those that give access to internal company systems and user information to weaknesses that allow attackers to send commands to achieve code execution remotely. Microsoft… Microsoft Ended Windows 7 security updates https://www.bleepingcomputer.com/news/microsoft/microsoft-ends-windows-7-extended-security-updates-on-tuesday/ Windows 7 Professional and Enterprise editions will no longer receive extended security updates for critical vulnerabilities starting Tuesday, January 10, 2023. The Extended Security Update (ESU) program was the last resort option for customers who still needed to run legacy Microsoft products past their end of support on Windows 7 systems. All editions of Windows 8.1, launched nine years ago in November 2013, also reached EOS on the same day. T-Mobile… T-Mobile admits to 37,000,000 customer records stolen by "bad actor." https://nakedsecurity.sophos.com/2023/01/20/t-mobile-admits-to-37000000-customer-records-stolen-by-bad-actor/ In plain English: the crooks found a way in from outside, using simple web-based connections that allowed them to retrieve private customer information without needing a username or password. T-Mobile first states the sort of data it thinks attackers didn't get, which includes payment card details, social security numbers (SSNs), tax numbers, other personal identifiers such as driving licenses or government-issued IDs, passwords, and PINs, and financial information such as bank account details.
On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: Google's search results have become a malware-riddled sh*tshow Ransomware payment values dropped by 40% YoY in 2022 Kraken takes over Solaris the old school way Grand Theft Auto RCE is wreaking havoc ManageEngine customers are all getting owned So you know, pretty much business as usual This week's show is brought to you by Kroll. Jim Hung co-leads the special projects and applied research team at Kroll and joins us to talk about the big changes happening in the incident response discipline. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Risky Biz News: Google Search and Ads have a major malware problem Justice Department Sues Google for Monopolizing Digital Advertising Technologies | OPA | Department of Justice Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner A Sneaky Ad Scam Tore Through 11 Million Phones | WIRED Risky Biz News: Crypto-crime volumes went down in 2022, ransomware payments too International Counter Ransomware Task Force kicks off - The Record from Recorded Future News Risky Biz News: Dark web mega-hack as Kraken takes over Solaris Congressman ‘coming for answers' after ‘no-fly list' hack - The Record from Recorded Future News Hackers Demand $10M From Riot Games to Stop Leak of ‘League of Legends' Source Code CVE - CVE-2023-24059 GoTo says hackers stole encrypted backups during November cyberattack - The Record from Recorded Future News Costa Rica's Ministry of Public Works and Transport crippled by ransomware attack - The Record from Recorded Future News Pakistani authorities investigating if cyberattack caused nationwide blackout - The Record from Recorded Future News Royal Mail trials ‘operational workarounds' following suspected ransomware attack - The Record from Recorded Future News Ransomware attack hits nearly 300 fast food restaurants in UK, including KFC and Pizza Hut - The Record from Recorded Future News Canada's largest alcohol retailer infected with card skimming malware twice since December - The Record from Recorded Future News Nearly 35,000 PayPal users had SSNs, tax info leaked during December cyberattack - The Record from Recorded Future News Samsung investigating claims of hack on South Korea systems, internal employee platform - The Record from Recorded Future News Electronic health record giant NextGen dealing with cyberattack - The Record from Recorded Future News Cyberattack on Nunavut energy supplier limits company operations - The Record from Recorded Future News More than 100 Mailchimp accounts accessed via social engineering cyberattack - The Record from Recorded Future News New T-Mobile Breach Affects 37 Million Accounts – Krebs on Security Suspected Chinese hackers exploit vulnerability in Fortinet devices - The Record from Recorded Future News More than 4,400 Sophos firewall servers remain vulnerable to critical exploits | Ars Technica CVE-2022-47966: Rapid7 Observed Exploitation of Critical ManageEngine Vulnerability | Rapid7 Blog AWS patches bypass bug in CloudTrail API monitoring tool | The Daily Swig 2022 Microsoft Teams RCE Git security audit reveals critical overflow bugs | The Daily Swig U.S. arrests Bitzlato cofounder, alleges $700 mln of illicit funds processed | Reuters FBI Confirms Lazarus Group Cyber Actors Responsible for Harmony's Horizon Bridge Currency Theft — FBI
On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: Google's search results have become a malware-riddled sh*tshow Ransomware payment values dropped by 40% YoY in 2022 Kraken takes over Solaris the old school way Grand Theft Auto RCE is wreaking havoc ManageEngine customers are all getting owned So you know, pretty much business as usual This week's show is brought to you by Kroll. Jim Hung co-leads the special projects and applied research team at Kroll and joins us to talk about the big changes happening in the incident response discipline. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Risky Biz News: Google Search and Ads have a major malware problem Justice Department Sues Google for Monopolizing Digital Advertising Technologies | OPA | Department of Justice Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner A Sneaky Ad Scam Tore Through 11 Million Phones | WIRED Risky Biz News: Crypto-crime volumes went down in 2022, ransomware payments too International Counter Ransomware Task Force kicks off - The Record from Recorded Future News Risky Biz News: Dark web mega-hack as Kraken takes over Solaris Congressman ‘coming for answers' after ‘no-fly list' hack - The Record from Recorded Future News Hackers Demand $10M From Riot Games to Stop Leak of ‘League of Legends' Source Code CVE - CVE-2023-24059 GoTo says hackers stole encrypted backups during November cyberattack - The Record from Recorded Future News Costa Rica's Ministry of Public Works and Transport crippled by ransomware attack - The Record from Recorded Future News Pakistani authorities investigating if cyberattack caused nationwide blackout - The Record from Recorded Future News Royal Mail trials ‘operational workarounds' following suspected ransomware attack - The Record from Recorded Future News Ransomware attack hits nearly 300 fast food restaurants in UK, including KFC and Pizza Hut - The Record from Recorded Future News Canada's largest alcohol retailer infected with card skimming malware twice since December - The Record from Recorded Future News Nearly 35,000 PayPal users had SSNs, tax info leaked during December cyberattack - The Record from Recorded Future News Samsung investigating claims of hack on South Korea systems, internal employee platform - The Record from Recorded Future News Electronic health record giant NextGen dealing with cyberattack - The Record from Recorded Future News Cyberattack on Nunavut energy supplier limits company operations - The Record from Recorded Future News More than 100 Mailchimp accounts accessed via social engineering cyberattack - The Record from Recorded Future News New T-Mobile Breach Affects 37 Million Accounts – Krebs on Security Suspected Chinese hackers exploit vulnerability in Fortinet devices - The Record from Recorded Future News More than 4,400 Sophos firewall servers remain vulnerable to critical exploits | Ars Technica CVE-2022-47966: Rapid7 Observed Exploitation of Critical ManageEngine Vulnerability | Rapid7 Blog AWS patches bypass bug in CloudTrail API monitoring tool | The Daily Swig 2022 Microsoft Teams RCE Git security audit reveals critical overflow bugs | The Daily Swig U.S. arrests Bitzlato cofounder, alleges $700 mln of illicit funds processed | Reuters FBI Confirms Lazarus Group Cyber Actors Responsible for Harmony's Horizon Bridge Currency Theft — FBI
Ransomware hits Costa Rican government systems, again. A Chinese threat actor deploys the BOLDMOVE backdoor against unpatched FortiOS. Credential stuffing afflicts PayPal users. T-Mobile discloses a data breach. A cyberattack hits a remote Canadian utility. The Wagner Group sponsors a hackathon. Malek Ben Salem from Accenture describes prompt injection for chatbots. Our guest is Paul Martini of iboss with insights on Zero Trust. And the FSB's Gamaredon APT runs a hands-on Telegraph phishing campaign against Ukrainian targets. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/13 Selected reading. Bolster Your Company Defenses With Zero Trust Edge (Forrester) MICITT detecta incidente informático en el MOPT, el cual ya se encuentra contenido (MICITT) MOPT mantiene habilitados todos los servicios de manera presencial (MICITT) Costa Rica's Ministry of Public Works and Transport crippled by ransomware attack (Record) Suspected Chinese Threat Actors Exploiting FortiOS Vulnerability (CVE-2022-42475) (Mandiant) Attackers Crafted Custom Malware for Fortinet Zero-Day (Dark Reading) Chinese hackers used recently patched FortiOS SSL-VPN flaw as a zero-day in October (Security Affairs) PayPal accounts breached in large-scale credential stuffing attack (BleepingComputer) PayPal Confirms Over 34,000 Customer Accounts Were Breached (EcommerceBytes) 35,000 PayPal accounts hacked, and users could've prevented it (PCWorld) Thousands Of PayPal Accounts Hacked—Is Yours One Of Them? (Forbes) Nearly 35,000 PayPal users had SSNs, tax info leaked during December cyberattack (The Record from Recorded Future News) T-Mobile Says Hacker Stole Data for 37 Million Customers (Bloomberg) T-Mobile Says Hackers Stole Data on About 37 Million Customers (Wall Street Journal) T-Mobile Says Hackers Used API to Steal Data on 37 Million Accounts (SecurityWeek) Cyberattack hits Nunavut's Qulliq Energy Corp. (CBC News) Nunavut power utility's servers hit by cyber attack | IT World Canada News (IT World Canada) Russian War Report: Russian hacker wanted by the FBI reportedly wins Wagner hackathon prize (Atlantic Council) Gamaredon (Ab)uses Telegram to Target Ukrainian Organizations (Blackberry) Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram (The Hacker News) Hitachi Energy PCU400 (CISA) Bolster Your Company Defenses With Zero Trust Edge (iBoss)
In this episode we discuss the PayPal issue, Nissan's vendor leaking data an org that gets defaced after ignoring vulnerability warnings, and more! Stories from the show: Social Security Numbers Stolen in PayPal Cyberattack https://www.cnet.com/tech/services-and-software/social-security-numbers-stolen-in-paypal-cyber-attack/ Nissan North America data breach caused by vendor-exposed database https://www.bleepingcomputer.com/news/security/nissan-north-america-data-breach-caused-by-vendor-exposed-database/ ODIN Intelligence website is defaced as hackers claim breach https://techcrunch.com/2023/01/15/odin-intelligence-website-defaced-sweepwizard/ MailChimp second breach in a year https://www.theregister.com/2023/01/19/mailchimp_fesses_up_to_2nd/ Solaris taken over by kraken https://www.bleepingcomputer.com/news/security/illegal-solaris-darknet-market-hijacked-by-competitor-kraken/
Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2022.10.19.512820v1?rss=1 Authors: Soo, W. W. M., Lengyel, M. Abstract: There continues to be a trade-off between the biological realism and performance of neural networks. Contemporary deep learning techniques allow neural networks to be trained to perform challenging computations at (near) human-level, but these networks typically violate key biological constraints. More detailed models of biological neural networks can incorporate many of these constraints but typically suffer from subpar performance and trainability. Here, we narrow this gap by developing an effective method for training a canonical model of cortical neural circuits, the stabilized supralinear network (SSN), that in previous work had to be constructed manually or trained with undue constraints. SSNs are particularly challenging to train for the same reasons that make them biologically realistic: they are characterized by strongly-connected excitatory cells and expansive firing rate non-linearities that together make them prone to dynamical instabilities unless stabilized by appropriately tuned recurrent inhibition. Our method avoids such instabilities by initializing a small network and gradually increasing network size via the dynamics-neutral addition of neurons during training. We first show how SSNs can be trained to perform typical machine learning tasks by training an SSN on MNIST classification. We then demonstrate the effectiveness of our method by training an SSN on the challenging task of performing amortized Markov chain Monte Carlo-based inference under a Gaussian scale mixture generative model of natural image patches with a rich and diverse set of basis functions - something that was not possible with previous methods. These results open the way to training realistic cortical-like neural networks on challenging tasks at scale. Copy rights belong to original authors. Visit the link for more info Podcast created by Paper Player, LLC
Npm timing attack could impact supply chain Legit software used to spread malicious WhatsApp mod Mango Markets hit by $100 million hack Thanks to today's episode sponsor, Noname Security Are you sure your APIs are secure? Noname Security discovers all the APIs running on your network and analyzes them to spot design flaws, misconfigurations, and vulnerabilities. You can even catalog sensitive data and quickly see how many APIs are able to access credit card data, phone numbers, SSNs, and other sensitive PII data. Learn more at nonamesecurity.com/posture-management
Fortinet warns admins to patch critical auth bypass bug immediately Windows 11 22H2 errors break provisioning Security chiefs fear ‘CISO scapegoating' following Uber-Sullivan verdict Thanks to today's episode sponsor, Noname Security Are you sure your APIs are secure? Noname Security discovers all the APIs running on your network and analyzes them to spot design flaws, misconfigurations, and vulnerabilities. You can even catalog sensitive data and quickly see how many APIs are able to access credit card data, phone numbers, SSNs, and other sensitive PII data. Learn more at nonamesecurity.com/posture-management For the stories behind the headlines, head to CISOseries.com.
Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2022.10.07.511265v1?rss=1 Authors: Yoshino, J., Mali, S., Williams, C., Morita, T., Emerson, C., Arp, C., Sophie, M., Yin, C., The, L., Chikaya, H., Motoyoshi, M., Ishii, K., Emoto, K., Bautista, D. M., Parrish, J. Z. Abstract: Somatosensory neurons (SSNs) that detect and transduce mechanical, thermal, and chemical stimuli densely innervate an animal's skin. However, despite the fact that epidermal cells provide the first point of contact for sensory stimuli. our understanding of roles that epidermal cells play in SSN function, particularly nociception, remains limited. Here, we show that stimulating Drosophila epidermal cells elicits activation of SSNs including nociceptors and triggers a variety of behavior outputs, including avoidance and escape. Further, we find that epidermal cells are intrinsically mechanosensitive and that epidermal mechanically evoked calcium responses require the store-operated calcium channel Orai. Epidermal cell stimulation augments larval responses to acute nociceptive stimuli and promotes prolonged hypersensitivity to subsequent mechanical stimuli. Hence, epidermal cells are key determinants of nociceptive sensitivity and sensitization, acting as primary sensors of noxious stimuli that tune nociceptor output and drive protective behaviors. Copy rights belong to original authors. Visit the link for more info Podcast created by PaperPlayer
Do you know that identity thieves don't need to steal your entire identity to use your information? Sometimes a single piece of information is all they need to build a whole new identity in a practice known as synthetic identity fraud. Links: Learn more about Triangle's Better Checking account with IDProtect* Have a Better Checking account? Register now at idprotectme247.com. Contact Triangle CU with any questions on getting set up. Learn more about the Big Three credit bureaus: Experian, Equifax, TransUnion Follow our Facebook, Instagram and Twitter pages! Learn more about Triangle Credit Union Transcript: Welcome to Money Tip Tuesday from the Making Money Personal podcast. Experian.com mentions that synthetic identity fraud is one of the fastest growing types of financial crimes out there. This type of identity fraud is when someone steals an identifying piece of information, typically, a social security number, and they use it with other information they've made up to create an entirely new identity. There are many ways a thief can get social security numbers, with one of the most popular places being the dark web. Once they get it, they create a new identity and use it to establish credit, apply for government programs, open bank accounts and for other criminal ways. Oftentimes they use the single number to create many different identities. If you want to keep your identity safeguarded, you need to protect as much of your information as possible. Here are a few things you can do to keep your information out of thieves' hands. The first is to monitor your credit by checking it regularly. Pay attention to statements, reports and notifications related to your identity. Another thing to do is request a credit freeze or lock. You can contact each credit bureau to freeze or lock your credit so no one can gain access to your report. It blocks authorized access as well as unauthorized access so make sure you unfreeze or unlock it first before you choose to apply for anything that requires a credit check. You can also freeze your kids' credit. Kids are often victims of identity fraud. Thieves can steal their social security numbers and personal information. You can freeze your kids' reports by making a request to each of the credit bureaus. They'll create a report and then freeze it to keep anyone from stealing their SSNs and other information. Make sure you are careful where you share information. Social media can be a gold mine for fraudsters who are looking for identifying information. Be careful when sharing personal information like birthdays or addresses on social sites. Also, if you're providing information to a new company or business and it asks you for your or your child's SSN, you can push back and ask them if it's necessary, and if you could use another form of identification instead. Keep an eye on your mail and other documentation. If you get notices or pre-approved credit offers in your child's name, that could be a sign of identity theft. Also, make sure you shred any mail, paper statements and pre-approved credit offers you don't need. Dumpster diving is still a thing and people can still get personal information from digging through trash. Get id protection in case something happens. Monitoring and notifications are the first line of defense when it comes to safeguarding your identity. But sometimes things can still happen. Get set up with an identity theft protection service so if you ever become the victim of identity fraud, you'll have an advocate who can help you manage it and recover. If you don't have identity protection, Triangle Credit Union offers a Better Checking account with ID Protect. This service provides credit monitoring, fraud resolution, and monthly credit reports to help you keep an eye on your identity. If you're looking for a first step, that's a good place to start. If there are any other tips or topics you would like us to cover, let us know at tcupodcast@trianglecu.org. Like and follow our Making Money Personal FB, IG and Twitter pages and look for our sponsor, Triangle Credit Union on social media to share your thoughts. Thanks for listening to today's Money Tip Tuesday and be sure to check out our other tips and episodes on the Making Money Personal podcast. Have a great day! *ELIGIBILITY: IDProtect service is a personal identity theft protection service available to personal checking account owners, their natural person joint account owners and their eligible family members (as defined below). The service is available to non-publicly traded businesses and their business owner(s) listed on the account and their eligible family members (service not available to employees or authorized signers who are not owners). For revocable grantor trusts, the service is available only when a grantor is serving as a trustee and covers the grantor trustee(s) and their eligible family members. For all other fiduciary accounts, the service covers the beneficiary, who must be the primary member, and the beneficiary's eligible family members (Fiduciary is not covered). Service is not available to a ""signer"" on the account who is not an account owner. Service is not available to clubs, organizations and/or churches and their members, schools and their employees/students. Eligible Family Members include: Spouse, persons qualifying as domestic partner, and children under 25 years of age and parent(s) who are residents of the same household. Insurance product is not a deposit; not NCUA insured; not an obligation of credit union; and not guaranteed by credit union or any affiliated entity. Registration/activation required. Triangle Credit Union membership is available to anyone working or residing in the Hillsborough, Merrimack, Belknap, Rockingham, and Cheshire Counties of New Hampshire, as well as the Franklin, Worcester, Middlesex, and Essex Counties of Massachusetts.
The Paychex Business Series Podcast with Gene Marks - Coronavirus
If there's one thing your business can count on, it's taxes. Given IRS requirements to report any non-wage income on various 1099 forms, Debbie Pflieger, an EY Americas Financial Services Tax Principal, Information Reporting and Withholding Services Leader, visits the show to advise you on all things 1099. Hear why legal names and Taxpayer Identification Numbers (TIN) are important to include, and how to classify your workers as independent contractors vs. employees. You'll also review recent changes to 1099-K reporting, impacting anyone receiving more than $600 in third-party online payments (such as PayPal, Square, and other apps) in 2022, and what it means for your business. Topics include: 2:20 - What are 1099s, and how do they work? 3:43- Nuances of a 1099-K ... 4:23 - ... 1099-NEC, 1099-INT, and 1099-DIV 5:28 - Due dates for IRS and payees 7:05 - SSN, EIN, ITIN for payees is a must 9:28 - Worker classification: employees vs. contractors 11:16 - Matching names, SSNs also critical 14:44 - What about corporations? 15:45 – 2022 change: 3rd party online income $600+ reported 19:35 - Document all expenses tied to online income 20:48 - PayPal, Square, other apps requesting EINs, SSNs ... 22:22 - ... to help you avoid 24% withholding requirements 23:46 - How to report payments to foreign vendors Resources: Employment tax reporting is a big responsibility. Read our article that helps you get familiar with the basics at www.paychex.com/articles/payroll-taxes/employers-guide-to-payroll-taxes. The IRS requires your business to treat payments to independent contractors vs. employees differently. Learn what you need to know about worker classification at www.paychex.com/articles/payroll-taxes/filing-taxes-for-independent-contractors. How can your business prepare now for your 2022 tax year responsibilities? Read our article for tips at www.paychex.com/articles/payroll-taxes/tax-saving-tips-at-year-end. DISCLAIMER: The information presented in this podcast, and that is further provided by the presenter, should not be considered legal or accounting advice, and should not substitute for legal, accounting, or other professional advice in which the facts and circumstances may warrant. We encourage you to consult legal counsel as it pertains to your own unique situation(s) and/or with any specific legal questions you may have.
The case of the seven million missing American children is a story of how tax planning shouldn't be done. In this episode, I cover that story and share ways we should be tax planning. You may be surprised at the order in which this planning should be done. Listen to learn more about that, and at the end of the episode, I'll share a general tip about tax planning. In this episode...A sad story of “missing” children [01:10] Legal strategies to reduce tax liability [03:03] Why HSAs are important in retirement [05:51] IRA contributions [07:43] A proactive tax approach [09:45] Imaginary childrenOne spring day in the late 1980s, over seven million American children went “missing.” The day was April 15th, the deadline for Americans to file taxes. The year was 1987, and it was the first year the IRS required tax filers to include the Social Security number (SSN) for any claimed dependents. In 1986, when taxpayers only had to provide the children's names, 77 million dependents were listed on tax returns. But, in 1987, when SSNs were required, only 70 million dependents were listed. Taxpayers in 1986 received an exemption of $1,900 per claimed dependent. That's $1,900 for each child that would be subtracted from any taxes owed. However, when the new requirements were implemented, 7 million children “disappeared,” resulting in an extra $2.8 billion in additional taxes paid to the treasury. Looking at the past, present, and futureClaiming imaginary children isn't the best idea for saving on taxes and is unwise. However, there are legal strategies to reduce lifetime tax liability in 2022 and beyond. One of the aspects I focus on with clients is tax mitigation. Paying less in taxes requires a proactive approach. All tax mitigation strategies should be verified with a tax professional and a certified financial planner. Why both? Because tax professionals often only look at the past, financial planners will also look at the present and future. These strategies assume that there isn't high-interest consumer debt, like credit cards, that needs to be paid off first, and an emergency fund has been established. The first priority to mitigate taxes is participating in a company 401k type retirement account. Company matches are always pre-tax, but they are low risk, and double your money to a certain percentage (subject to individual plan vesting and matching percentage guidelines). Another step to consider is contributing to a health-saving account. These accounts are the only ones that are triple tax-free. Taxes in traditional retirement accountsWe have to have a plan when it comes to taxes. Most Americans save for retirement in what are called traditional retirement accounts. We choose to be taxed during retirement when the funds are withdrawn from these accounts. Many people look at their 401k or IRA balances and believe that money is all theirs to spend. However, that money is partly the government's. Since taxes are owed on these funds, how much is taken by the government will ultimately depend on planning. In the next episode, I'll be going over what is often called the ticking tax time bomb and a strategy, called a Roth conversion, that could reduce your taxes. This information is not intended to be a substitute for specific individualized tax advice. We suggest that you discuss your specific tax issues with a qualified tax advisor. Resources & People Mentionedhttps://www.betterplanningbetterlife.com/blogpodcast/seven-million-missing-children (7 Million Missing Children) https://www.latimes.com/archives/la-xpm-1989-12-11-me-33-story.html (The IRS' Case of Missing Children - Los Angeles Times) Connect with Jonny Westhttps://betterplanningbetterlife.com/ (https://BetterPlanningBetterLife.com) Connect with Jonny https://www.linkedin.com/in/jonny-west/ (on LinkedIn) Subscribe to ONE FOR THE MONEY on https://podcasts.apple.com/us/podcast/one-for-the-money/id1590932593 (Apple...
Eric Taylor, formerly known as "Cosmo The God," began hacking at age 12 and by age 15 he was leaking the social security numbers of celebrities and high profile politicians, only to find himself face-to-face with the FBI SWAT team. In this episode of Cybercrime Radio, Eric joins host Hillarie McClure to share his story about how he became "Cosmo The God," why he wasn't financially motivated when leaking the SSNs of Joe Biden and Kim Kardashian alike, and why the entire experience made him reform and become a cybersecurity ally. For more on cybersecurity, visit us at https://cybersecurityventures.com
Support us on Substack!News discussed:The United States, as a civilization, did a thing!Steve Sweeney lost to a dude named Ed DurrThe infrastructure bill passed“Texas has open ports”Also the video is full of lies. And Texas ports are also short on driversMissouri Gov. legally threatens cybersecurity professor that discovered the state had published over 100,000 school employee's SSNs to anyone with an internet connection. Elon Musk is going to sell 10% of his Tesla stock so he can pay taxes on itBribed doctors in Greece give “fake” COVID vaccine that has real vaccine in it Happy News!Pfizer and Merck both developed covid pillsTech-heavy senolytics articleLayman-friendly senolytics article Hertz placed an order for 100,000 Tesla cars for its fleet. WaPo on mRNA flu vaccinesGot something to say? Come chat with us on the Bayesian Conspiracy Discord or email us at themindkillerpodcast@gmail.com. Say something smart and we'll mention you on the next show!Follow us!RSS: http://feeds.feedburner.com/themindkillerGoogle: https://play.google.com/music/listen#/ps/Iqs7r7t6cdxw465zdulvwikhekmPocket Casts: https://pca.st/vvcmifu6 Stitcher: https://www.stitcher.com/podcast/the-mind-killer Apple: Intro/outro music: On Sale by Golden Duck Orchestra This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit mindkiller.substack.com/subscribe
ITINs, CPNs, and SSNs may look incomprehensible, but they form a unique look at your fundability. In this episode, Merrill Chandler digs deep into these identification numbers and gives us the lowdown on what they mean. We look at SSNs and analyze the meaning of these numbers. Merrill gives us the score on CPNs and talks about why these are fraudulent numbers that you should avoid at all cost. We also take a peek at ITINs and why these are important fundability tools for foreign people in the US. Love the show? Subscribe, rate, review, and share! http://getfundablepodcast.com/
When was the last time you visited a physical bank branch and talked to a real live human about your account? It's probably been a while — and that’s the point. The fintech world is becoming more digitized all the time. Eventually, there won’t even be brick-and-mortar banks. That’s all well and good. But, as we innovate the future of banking, we need to consider how to fight fraud online. Unlike in-person banking, digital banking doesn’t allow for a teller to verify someone’s ID with his own two eyes. In reality, it's not as scary as it sounds. Depending on how you think about it, there are more ways to detect fraud online than in person. You can track IP addresses, phone numbers, emails — and you can verify them all instantly. One hold up to fully digital banking (and transactions in general) remains: Your social security number. Those little paper cards with that long-form number have been used for ages as our unique identifiers. But really, SSNs have been breached so many times that they’re not an ideal universal identity option anymore. So, what’s next? In our latest podcast episode, host J Cornelius and guest Heidi Hunter reveal the future of identity verification for fintech companies and users alike. You’ll Also Learn: The importance of detecting fraud while providing a friction-free user experience. A three-tiered approach to innovation for customer-facing fintech companies. Hint: It involves sales, support, and biz collaboration. What tokenized IDs mean for the UX of transactions. About Heidi Hunter Heidi Hunter is the Vice President of Product Innovations at IDology. In her nine plus years with the company, she’s steadily (and impressively) moved up the ranks.IDology is a leader in digital identity verification and authentication, and Heidi is a trusted expert on and innovator of ID and fraud prevention solutions. Additionally, Heidi has a proven track record in client consulting, strategic partner management, and data science. She has also developed SaaS and deployed several successful, intricate client applications. See acast.com/privacy for privacy and opt-out information.
Lots of news to cover today... and to me the common thread seems to be a lack of proper security and privacy. So the theme today is "trust no one". And the idea there isn't really personal trust, but computer trust, algorithm trust, procedural trust. We need to engineer our systems and processes around the idea that data is a toxic asset that loves to find ways to leak. Assume that you will be hacked. Assume an employee will do something stupid or go rogue. Assume the "bad guys" will find a way to bypass your main security barrier, so you need to have a second, and possible third barrier in place. Today I'll tell you about yet another massive Facebook and LinkedIn data leak; a new vaccine survey scam to watch out for; some new and troubling ransomware tactics to force victims to pay even if they have good data backups; a hacker site that sold credit cards and social security numbers was itself hacked; LexisNexis and Clearview AI have been working very closely with law enforcement, including ICE; and the ACLU has been caught sharing their own user's data with (of all companies) Facebook. And finally, I review the fantastic new book, Privacy is Power by Carissa Véliz. Further Info BECOME A PATRON! https://www.patreon.com/FirewallsDontStopDragons Privacy is Power book review: https://firewallsdontstopdragons.com/privacy-is-power-review/ Were you part of a data breach? https://haveibeenpwned.com/ Articles quoted today:Don’t Fall for the 'Vaccine Survey' Scam https://twocents.lifehacker.com/don-t-fall-for-the-vaccine-survey-scam-1846620925 Ransomware gang leaks data from Stanford, Maryland universities https://www.bleepingcomputer.com/news/security/ransomware-gang-leaks-data-from-stanford-maryland-universities/ Ransom Gangs Emailing Victim Customers for Leverage https://krebsonsecurity.com/2021/04/ransom-gangs-emailing-victim-customers-for-leverage/ Facebook Says Leak of 533 Million Users’ Data Wasn’t a Hack. https://www.wsj.com/articles/facebook-says-leak-of-533-million-users-data-wasnt-a-hack-does-it-matter-11617910106 , https://www.bleepingcomputer.com/news/security/533-million-facebook-users-phone-numbers-leaked-on-hacker-forum/ Another 500 million accounts have leaked online, and LinkedIn’s in the hot seat https://www.theverge.com/2021/4/8/22374464/linkedin-data-leak-500-million-accounts-scraped-microsoft 70,000 SSNs, 600,000 Credit Card Records Leaked After Stolen-Data Hub Gets Hacked https://gizmodo.com/70-000-ssns-600-000-credit-card-records-leaked-after-s-1846638234 LexisNexis to Provide Giant Database of Personal Information to ICE https://theintercept.com/2021/04/02/ice-database-surveillance-lexisnexis/ Clearview AI used by police https://www.buzzfeednews.com/article/ryanmac/clearview-ai-local-police-facial-recognition ACLU, a defender of digital privacy, reveals that it shares user data with Facebook https://fortune.com/2021/04/02/aclu-shares-data-facebook-third-parties-digital-privacy/
Good Morning and Welcome to the ProactiveIT Cyber Security Daily number 336. It is Monday April 5th 2021. I am your host Scott Gombar and Eight States Can’t Do Vehicle Inspections Due to Malware VMware Releases Security Update FBI: APTs Actively Exploiting Fortinet VPN Security Holes 533 Million Facebook Users' Phone Numbers and Personal Data Leaked Online Brown University hit by cyberattack, some systems still offline Capital One notifies more clients of SSNs exposed in 2019 data breach Ubiquiti cyberattack may be far worse than originally disclosed Ransomware gang leaks data from Stanford, Maryland universities Microsoft outage caused by overloaded Azure DNS servers Malware attack is preventing car inspections in eight US states
With the growth of tyranny we are facing, it's important that we look at our struggle for freedom not in terms of election cycles but in terms of generations. Our hope for liberty lies in our children and our children's children. In this video, John Bush, a father of two, shares tips and strategies for raising sovereign children that are ungovernable. He will discuss homebirth, natural health, SSNs, peaceful parenting, alternatives to government school, the importance of strong community, and more!If you have kids or plan on having kids, you don't want to miss this important video. Join the support group "So you want to pull your kids out of government school?"Facebook - https://www.facebook.com/groups/416149439786936Telegram - https://t.me/joinchat/EFipEBw3E-xxErw7qRaKagThis video is part of the Freedom Cell Network Sovereign Child Initiative which aims to provide parents and children with the knowledge and tools necessary to raise a generation of sovereign and ungovernable children.Subscribe to the Live Free Now podcast here - http://livefreenow.show
Bryan McGrath rejoins the Net Assessment team to discuss the U.S. Navy's Battle Force 2045 proposal. Bryan, Melanie, Chris, and Zack agree that the proposed 500 ship force is a fantasy that will not be fully funded. But they express optimism that these plans will provide useful starting points for deeper thinking about the Navy's future force. Chris launches an email etiquette crusade, Zack complains about sexism in defense reporting, Bryan commends the name of the Navy's first guided missile frigate, and Melanie urges everyone to vote. Links "Secretary of Defense Remarks at CSBA on the NDS and Future Defense Modernization Priorities," Department of Defense, October 6, 2020 Megan Eckstein, "SECDEF Esper Calls for 500-Ship Fleet by 2045, With 3 SSNs a Year and Light Carriers Supplementing CVNS," USNI News, October 6, 2020 Bryan McGrath, "Deterring War, Conducting War, Ending War: What Seapower Does," CDR Salamander Blog, August 26, 2020 Bryan McGrath, Twitter, October 16, 20 Helene Cooper and Eric Schmitt, "A Trump Victory May Push His Defense Secretary Out an Open Door," New York Times, October 23, 2020 David B. Larter, "S. State Department to Allow Sale of Hundreds of Anti-Ship Missiles to Taiwan Amid Diplomatic Row," Defense News, October 26, 2020 Brandon Valeriano, Twitter, October 18, 2020 Harlan Ullman, “Battle Force 2045 Raises Important Questions,” US Naval Institute Proceedings, October 2020 Ronald O’Rourke, “Navy Force Structure and Shipbuilding Plans: Background and Issues for Congress,” Congressional Research Service, October 7, 2020 Ronald O’Rourke and Michael Moodie, “S. Role in the World: Background and Issues for Congress,” Congressional Research Service, Updated August 26, 2020 Mark Montgomery, "Is Esper's New Plan for the Navy Enough for the Indo-Pacific?", War on the Rocks, October 21, 2020 Emily Oster, "Schools Aren't Super-Spreaders," Atlantic, October 9, 2020 Jay Nordlinger, "Trump and Dictators," National Review, October 20, 2020
Despite consumer’s growing reliance on online marketplaces (especially during social distancing) many still don’t have an adequate level of assurance for verifying customers (e.g. many only require an email, username and password). Meanwhile, other online marketplaces leverage hundreds of different behavioral biometrics and knowledge-based parameters for verifying customers. But the disadvantage there is that the additional security layers slow down the verification process, which can lead to lost customers (especially younger generations). Another largely unknown fraud technique that’s a particularly significant, common threat amid the COVID-19 outbreak involves using SSNs stolen from recently-deceased individuals and public or breached information to create synthetic identities (and even synthetic families with a spouse and kids). Cybercriminals then establish creditability for those synthetic identities using a variety of tactics, such as making online transactions and leaving a digital trail of breadcrumbs – allowing them to eventually load up on loans and credit, spend it all and vanish. Sanjay can discuss this growing threat, how identity theft is changing during the pandemic, and how businesses and consumers can help prevent it. Sanjay Gupta from Mitek discusses how online marketplaces are leveraging biometrics in customer onboarding and how they can balance security with usability. We also talk about how cybercriminals are capitalizing on the recently-deceased and creating synthetic identities and synthetic families.
Each episode of EMEA Core Credit by Reorg biweekly podcast series features a deep dive on issues and companies in the distressed and high-yield space. This week, the team takes a look at Rubis' new SSNs, Covid-19 adjusted EBITDA and a test case for U.K. insurers post-lockdown. If you are not a Reorg subscriber, request access here: go.reorg-research.com/Podcast-Trial.
Fraudster innovation is a constant. As the defenders of payment transactions thwart one fraud vector, these innovators, playing offense, switch tactics. Today, the problem of knowing who you are, that you are who you say you are, in the digital domain demands stronger authentication techniques. Many of those rely on the attributes, the data, provided by the user or by the applicants in the case of credit extension. In turns out that even the data supplied by applicants can be both entirely bogus and sufficient to convince a credit issuer to onboard the applicant and extend credit. This is the problem of synthetic identity. To explore the synthetic identity challenge, take a listen to this conversation with Naftali Harris, CEO of SentiLink, a company focusing on detecting synthetic identities. Coming from years at Affirm, Naftali and the SentiLink team serve credit issuers struggling with this new fraud vector. First, let’s define synthetic identity using the Fed’s Synthetic Identity Fraud in the U.S. Payment System Payments Fraud Insight white paper as the source: “The generally agreed-upon definition of synthetic identity fraud is a crime in which perpetrators combine fictitious and sometimes real information, such as SSNs and names, to create new identities to defraud financial institutions, government agencies or individuals.” Now we’re looking for phantoms. Uh-oh. There are terabytes of personally identifiable information for fraudsters to use because of data breaches and our own over-sharing of our personally identifiable information. Knowledge-based authentication based on static data like SSNs, birthdays, and the name of our hometown isn’t hard to break. Nor is this static data generally protected by tokenization or encryption in any way. The fraudsters know what we know. Uh-oh. And because the real data presented by the fraudster creating a virtual identity is often that of a child or an elder or even the deceased, well, it’s super hard to detect. That comes from my Glenbrook colleague Yvette Bohanan who has years of risk management experience at Amazon, Google, eBay, BofA and others. Of course, the fraudster’s goal in making up a new identity is to open a credit line in order to subsequently defraud the issuer, perhaps by carefully using a credit line carefully for years to build up a high credit limit before busting out with a lot of spending and then disappearing to a beach somewhere. Multiple Types of Synthetic Identities A startling aspect of some synthetic identity fraud is that it doesn’t take advantage of purloined PII. All of the data used by the credit application is made up out of whole cloth and thin air. The proper format of a social security is well known so why not generate a random one? After all, the federal government doesn’t operate a central SSN repository with realtime validation. A variant approach relies on real and fake data, combining, for example real names with made-up SSNs. To explore the synthetic identity challenge, take a listen to this conversation with Naftali Harris, CEO of SentiLink, a company focusing on detecting synthetic identities. Coming from years at Affirm, Naftali and the SentiLink team serve credit issuers struggling with this new fraud vector.
Bienvenidos a otro episodio del podcast SSNS. En este episodio relatamos el porque Puma tuvó el mejor año en su historia, hablamos de las siluetas nuevas de la marca además del enfoque de Puma que en este caso es en basquetbol y en mujeres. Aunado a todo esto les hago un review a los Puma Future Rider Play On. Host: Raul Vela Links a continuación para que sigan al podcast y escriban comentarios o sugerencias en redes sociales. Instagram: https://www.instagram.com/rvlexperience/ Facebook: https://www.facebook.com/rvlexperience/ Youtube: https://www.youtube.com/channel/UCNJY7aYXhmKmW6hZTqJSZag?view_as=subscriber Website: https://anchor.fm/rvlexperience
Bienvenidos a un nuevo episodio del podcast SSNS.En este episodio discutimos acerca del futuro de una de mis siluetas favoritas el Jordan 1, les dejo una reseña del Fearless AJ1 ZOOM AIR y de igual manera comentó acerca de cosas DIY para poder mejorar la comodidad de sus Jordan 1 tradicionales! Host: Raul Vela Links a continuación para que sigan al podcast y escriban comentarios o sugerencias en redes sociales. Instagram: https://www.instagram.com/rvlexperience/ Facebook: https://www.facebook.com/rvlexperience/ Youtube: https://www.youtube.com/channel/UCNJY7aYXhmKmW6hZTqJSZag?view_as=subscriber Website: https://anchor.fm/rvlexperience
Bienvenidos a otro episodio del podcast SSNS. En este episodio discutimos acerca de quienes son los posibles MVP´s de ambas ligas y por ende un update de lo que esta sucediendo en dichas ligas. La NFL parece que ya esta decidida entre dos jugadores pero en la NBA hay muchos pero muchos contendientes y esta muy divertido ver tanta grandeza. No se lo pierdan! Host: Raul Vela Links a continuación para que sigan al podcast y escriban comentarios o sugerencias en redes sociales. Instagram: https://www.instagram.com/rvlexperience/ Facebook: https://www.facebook.com/rvlexperience/ Youtube: https://www.youtube.com/channel/UCNJY7aYXhmKmW6hZTqJSZag?view_as=subscriber Website: https://anchor.fm/rvlexperience
Bienvenidos a un nuevo episodio del podcast SSNS. En este episodio les detallo los lanzamientos de sneakers más importantes del mes de noviembre y mis opiniones con respecto a dichos lanzamientos. También hablamos de la colección de Adidas x Star Wars que incluye modelos como el Nite Jogger y el Ultra Boost. Estoy muy emocionado por el final de la saga de Star Wars y la marca alemana esta aprovechando perfecto este hype para crear productos increíbles. Host: Raul Vela Links a continuación para que sigan al podcast y escriban comentarios o sugerencias en redes sociales. Instagram: https://www.instagram.com/rvlexperience/ Facebook: https://www.facebook.com/rvlexperience/ Youtube: https://www.youtube.com/channel/UCNJY7aYXhmKmW6hZTqJSZag?view_as=subscriber Website: https://anchor.fm/rvlexperience
En este episodio de su podcast SSNS les traego una reseña del pack de Nike del día de los muertos 2019. Les explico que representa cada modelo en la colección, el cortez, el air max 95 y el air force 1 además de que representan este tipo de packs o colaboraciones en culturas emergentes en cuanto a sneakers como lo es México por ejemplo. Otro tema del cual hablamos es el lanzamiento del Jordan 1 Shattered Backboard 3.0 y como se llevó acabo dicho lanzamiento en conjunto al del pack del día de los muertos! Host: Raul Vela Links a continuación para que sigan al podcast y escriban comentarios o sugerencias en redes sociales. Instagram: https://www.instagram.com/rvlexperience/ Facebook: https://www.facebook.com/rvlexperience/ Youtube: https://www.youtube.com/channel/UCNJY7aYXhmKmW6hZTqJSZag?view_as=subscriber Website: https://anchor.fm/rvlexperience
En este episodio del podcast SSNS hablamos de todo lo que esta sucediendo entre USA y China y como esta involucrado la NBA. También platicamos de todas las implicaciones que tiene la pelea de China con la NBA y hablamos de lo que puede llegar a suceder si no se arregla. También habrá un segmento donde hablamos de lo que sigue sucediendo en los playoffs de la MLB y ya se esta viendo más claro el panorama para ver que equipos van a estar en la Serie Mundial. Es un episodio sumamente informativo y entretenido que no se deben perder! Host: Raul Vela Links a continuación para que sigan al podcast y escriban comentarios o sugerencias en redes sociales. Instagram: https://www.instagram.com/rvlexperience/ Facebook: https://www.facebook.com/rvlexperience/ Youtube: https://www.youtube.com/channel/UCNJY7aYXhmKmW6hZTqJSZag?view_as=subscriber Website: https://anchor.fm/rvlexperience
En este episodio de SSNS platicamos del hombre del año en el mundo de los sneakers. Travis Scott. Hablamos del lanzamiento reciente del Jordan 6 por Travis, porqué creo que es el mejor lanzamiento que ha hecho con Nike y que significa este tipo de colaboraciones y colaboradores para la marca a futuro. 2019 ha sido dominado por este hombre y en este episodio discutimos esto a fondo. Espero y lo disfruten!! Host: Raul Vela Links a continuación para que sigan al podcast y escriban comentarios o sugerencias en redes sociales. Instagram: https://www.instagram.com/rvlexperience/ Facebook: https://www.facebook.com/rvlexperience/ Youtube: https://www.youtube.com/channel/UCNJY7aYXhmKmW6hZTqJSZag?view_as=subscriber Website: https://anchor.fm/rvlexperience
Bienvenidos a un nuevo episodio de SSNS podcast! Este episodio va ser un poquito diferente porque hablaremos de deportes y de sneakers en un mismo episodio. Para aquellos que les interese saber, al minuto 14:05 comienza la sección deportiva pero algo me dice que van a querer escuchar! Hablamos de mi viaje a Austin, la tienda de sneaker politics y porqué me negaron la entrada por tener Jordans! De igual manera platicamos de lo que esta sucediendo en la MLB con la lesión de Yelich, del regreso de la champions league y a la vez de lo que esta causando Antonio Brown y porque la NFL se esta convirtiendo en la NBA al darle empoderamiento puro a los jugadores que piden cambio. Es un episodio lleno lleno de cosas que de verdad no se pueden perder!! Host: Raul Vela Links a continuación para que sigan al podcast y escriban comentarios o sugerencias en redes sociales. Instagram: https://www.instagram.com/rvlexperience/ Facebook: https://www.facebook.com/rvlexperience/ Youtube: https://www.youtube.com/channel/UCNJY7aYXhmKmW6hZTqJSZag?view_as=subscriber Website: https://anchor.fm/rvlexperience
I breakdown two defensive relapses by the Texans and saints in lady nights game and I give my take on Ms. Jenny Mai. Ssns that's it!!! --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/benjamin-braziel/support
We keep hearing in the news when companies have experienced a breach either due to malware, ransomware or social engineering. To reduce the potential for fraud some companies, may even yours, have removed vendor banking from the Accounting System/ERP completely. Can we do the same with Vendor SSNs? And how can you get help with your W-9's and use a discount code to save? Keep listening. Check out my website www.debrarrichardson.com if you need help cleaning your vendor master file or implementing authentication, internal controls and best practices to it from fraud. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug. Links mentioned in the podcast: AUTHENTICATION. VALIDATION. MANAGEMENT. TM eGuide or ToolkitRead the Blog: https://www.debrarrichardson.com/blog/should-we-require-eins-vs-ssns-from-our-irs-reportable-vendors-to-reduce-the-risk-in-our-vendor-master-file5 Day Vendor Master File Clean-Up: https://www.debrarrichardson.com/consultingForbes Article: Data Breaches Expose 4.1 Billion Records In First Six Months Of 2019W-9 Manager: www.w9manager.com Use code HAPPY19 for 10% offIRS Employer ID Number (Including “Apply for an EIN Online” option. Click hereWant a handy Cheat Sheet that includes the links to vendor validation resources? Sign up for my mailing list to download the Vendor Validation Reference List and share with your entire team! Vendor Validation Reference List with Resources Links: www.debrarrichardsonMore Podcasts/Blogs www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Bienvenidos al episodio 49 del podcast SSNS, la verdad es que me llamó mucho la atención el retiro de Andrew Luck y decidí hacer unas preguntas vía mi instagram para saber que opinaban al respecto. En este episodio debatimos los retiros más inesperados de toda la historia con atletas como Megatron, Barry Sanders, Jordan en el 93, Magic y demás. La verdad es un episodio que nos deja pensando también en el futuro del deporte específicamente en la NFL y si los retiros tempraneros afectaran el deporte a la larga. Host: Raul Vela Links a continuación para que sigan al podcast y escriban comentarios o sugerencias en redes sociales. Instagram: https://www.instagram.com/rvlexperience/ Facebook: https://www.facebook.com/rvlexperience/ Youtube: https://www.youtube.com/channel/UCNJY7aYXhmKmW6hZTqJSZag?view_as=subscriber Website: https://anchor.fm/rvlexperience
https://vimeo.com/346614261 https://www.currentfederaltaxdevelopments.com/podcasts/2019/7/6/2019-07-08-congress-enacts-the-taxpayer-first-act Update for the week of July 8, 2019. This week we look at: The Taxpayer First Act of 2019, signed into law on July 1, 2019 The Supreme Court decides one trust due process case is enough for a single term IRS proposed a change in MEP to allow a solution to the one bad apple problem IRS goes back to issuing guidance via website FAQs, this time for QOFs Employers will be able to truncate SSNs on W-2s given to employees--but not right away IRS finalizes regulations barring partnerships from using disregarded entities to put partners on the payroll
Update for the week of July 8, 2019. This week we look at: The Taxpayer First Act of 2019, signed into law on July 1, 2019 The Supreme Court decides one trust due process case is enough for a single term IRS proposed a change in MEP to allow a solution to the one bad apple problem IRS goes back to issuing guidance via website FAQs, this time for QOFs Employers will be able to truncate SSNs on W-2s given to employees--but not right away IRS finalizes regulations barring partnerships from using disregarded entities to put partners on the payroll Copyright 2019 Kaplan Professional Education
What equipment does the Chinese People's Liberation Army (PLA) have in Hong Kong? What will be the role of AI and cyber offensive capabilities on the future battlefield? In this episode of the Weekly Defence Podcast, we hear from our Asia Pacific Editor about China's Hong Kong garrison and the military equipment on display at a recent base open day. We speak to a former Commandant of the French Foreign Legion about his vision of collaborative combat.The team look at the implications of the major defence stories of the week and our sponsor Nammo considers the trend of governments entering into long-term supply agreements with industry.News Round Up (00:48) This week in the news…On the naval front, Editor-in-Chief Richard Thomas outlines Russian plans to procure two Project 885M nuclear-powered submarines and two Project 677 diesel-electric submarines to boost its sub-surface fleet.China is also growing its submarine fleet. The US credits the People's Liberation Army Navy (PLAN) with currently having six SSBNs, six SSNs and 50 diesel-electric submarines.An analysis by Asia Pacific Editor Gordon Arthur shows how China has developed a more modern submarine force, optimised primarily for regional anti-surface warfare missions near major sea lines of communication.On the aviation side of the house, Air Domain Editor Helen Haxell explains how the Philippine Air Force (PAF) used the celebration of its 72nd anniversary on 2 July to highlight new platforms that the force is expecting in the coming year or so.Land-side, in the wake of the final formation of Rheinmetall BAE Systems Land (RBSL), Deputy Land Domain Editor Beth Maundrill considers how this development could affect the British Army's Challenger 2 Life Extension Programme (CR2 LEP).Behind the news – a visit to the Hong Kong Garrison of the People's Liberation Army (16:00)Over a three-day period from 29 June to 1 July, the Hong Kong Garrison of the People's Liberation Army (PLA) opened the gates of three of its military camps to ticket-carrying members of the public.Our Asia Pacific Editor Gordon Arthur was there and explains to host Helen Haxell how, in light of ongoing civil tensions and mass public protests in Hong Kong, the PLA was on even higher alert than normal, with several new pieces of equipment on display. You can read Gordon's full story here: PLA shows varied capabilities in Hong KongInterview – General Alain Bouquin (30:48)Tony Skinner, VP Content, speaks to General Alain Bouquin – a former Commandant of the French Foreign Legion and now strategic advisor to Thales – about the use of cyber attack and AI on the battlefield and his concept of collaborative combat.Industry Voice – Nammo (42:38)In this week's Industry Voice Tony Skinner, our VP of Content, and Endre Lunde, SVP of Communications for Nammo, discuss the trend of governments entering into long-term supply agreements with industry and the implications for international cooperation.Music and sound mixing provided by Fred Prest
Nobody’s going to take it over, sorry startups! The 4 Horsemen of Configuration Management They need Java in Cincinnati. The Mongols have no wine. Coté’s going to filibuster ChefConf. https://d2mxuefqeaa7sj.cloudfront.net/s_496DF11063CDFDD5ADCDE2994265DC79C0316721C26F879BC276FEB51BCD7829_1551997391988_image.png Relevant to your interests Red Hat launches Operator Hub, a repository of quality-tested Kubernetes Operators (https://news.google.com/articles/CAIiENvILOykuSzXahegtrj67r0qEwgEKgwIACoFCAowsGkw8AYwgxM?hl=en-US&gl=US&ceid=US%3Aen) Bitbucket Simplifies Building CI/CD Pipelines with Pipes - The New Stack (https://thenewstack.io/bitbucket-simplifies-building-ci-cd-pipelines-with-pipes/) DevOps consolidation continues with JFrog and Shippable (https://searchsoftwarequality.techtarget.com/news/252458615/DevOps-consolidation-continues-with-JFrog-and-Shippable) The Digital Maginot Line (https://www.ribbonfarm.com/2018/11/28/the-digital-maginot-line/) Former Kaspersky Lab Expert Sentenced in Russia for Treason (https://www.darkreading.com/vulnerabilities---threats/former-kaspersky-lab-expert-sentenced-in-russia-for-treason/d/d-id/1333972) Amazon Web Services CEO: We're a $30 billion revenue run rate business in the 'early stages (https://www.cnbc.com/2019/02/28/amazon-cloud-ceo-we-have-a-30-billion-run-rate-in-our-early-stages.html)’ Data manager DataStax prepares for IPO: sources (https://www.reuters.com/article/us-datastax-ipo/data-manager-datastax-prepares-for-ipo-sources-idUSKCN1QI5K0) The New Bellwether For Enterprise IT (https://www.nextplatform.com/2019/03/01/the-new-bellwether-for-enterprise-it/) What happened to OpenStack (https://aeva.online/2019/03/what-happened-to-openstack/) Chronicle: Can I Get The Backstory? (https://medium.com/@chroniclesec/introducing-backstory-45dd9b4d4a6d) and more on Backstory (https://chronicle.security/products/backstory/?utm_source=newsletter&utm_medium=email&utm_campaign=newsletter_axioscodebook&stream=technology) RIP passwords | Product Hunt (https://www.producthunt.com/newsletter/2570?utm_campaign=2570_2019-03-04&utm_medium=email&utm_source=Product+Hunt) Phone numbers are the new SSNs (https://www.axios.com/newsletters/axios-login-59a4e953-dc46-49ea-bc8b-a097d09b0dfb.html?chunk=0&utm_term=emshare#story0) (https://www.axios.com/newsletters/axios-codebook-17f78023-b099-4a6b-b48b-843d28b87e32.html?chunk=0&utm_term=emshare#story0)- NSA's new cybersecurity tool (https://www.axios.com/newsletters/axios-codebook-17f78023-b099-4a6b-b48b-843d28b87e32.html?chunk=0&utm_term=emshare#story0) State of Open Source Security report 2019 (https://snyk.io/blog/top-ten-most-popular-docker-images-each-contain-at-least-30-vulnerabilities/) Lyft has to pay Amazon's cloud at least $8 million a month until the end of 2021 (https://www.google.com/amp/s/amp.businessinsider.com/lyft-ipo-amazon-web-services-2019-3) Build your own Data Center….It is going to cost you? (https://twitter.com/mohapatrahemant/status/1102401615263223809?s=21) Introducing Kraken, an Open Source Peer-to-Peer Docker Registry (https://eng.uber.com/introducing-kraken/) Nonsense Tesla launches long-awaited standard Model 3 starting at $35,000 (https://www.cnbc.com/2019/02/28/tesla-suspends-online-orders-ahead-of-announcement-redirects-website.html) Luminary. A better way to podcast (https://luminarypodcasts.com) Farm Sim Steering Wheels, Side Panels, Shifters for Farm Simulator Games | Logitech G (https://www.logitechg.com/en-us/products/farm.html) Sponsors Solarwinds To learn more or try the company’s DevOps products for free, visit https://solarwinds.com/devops. Conferences, et. al. ALERT! DevOpsDays Discount - DevOpsDays MSP (https://www.devopsdays.org/events/2019-minneapolis/welcome/), August 6th to 7th, $50 off with the code SDT2019 (https://www.eventbrite.com/e/devopsdays-minneapolis-2019-tickets-51444848928?discount=SDT2019). 2019, a city near you: The 2019 SpringTours are posted (http://springonetour.io/). Coté will be speaking at many of these, hopefully all the ones in EMEA. They’re free and all about programming and DevOps things. Free lunch and stickers! Mar 7th to 8th, 2019 - Incontro DevOps in Bologna (https://2019.incontrodevops.it/), Coté speaking. Mar 13th, 2019 - Coté speaking at (platform as a product) (https://www.meetup.com/Continuous-Delivery-Amsterdam/events/258120367/) - Continuous Delivery, Amsterdam. Mar 18th to 19th, 2019 - SpringOne Tour London (https://springonetour.io/2019/london). Get £50 off ticket price of £150 with the code S1Tour2019_100. Mar 21st to 2nd, 2019 (https://springonetour.io/2019/amsterdam) - SpringOne Tour Amsterdam. Get €50 off ticket price of €150 with the code S1Tour2019_100. ChefConf 2019 (http://chefconf.chef.io/) May 20-23. Matt’s speaking! ChefConf London 2019 (https://chefconflondon.eventbrite.com/) June 19-20 ## Get a Free SDT T-Shirt Write an iTunes review of SDT and get a free SDT T-Shirt. Write an iTunes Review on the SDT iTunes Page. (https://itunes.apple.com/us/podcast/software-defined-talk/id893738521?mt=2) Send an email to stickers@softwaredefinedtalk.com (mailto:stickers@softwaredefinedtalk.com) and include the following: T-Shirt Size (Only XL remain), Preferred Color (Gray, Black) and Postal address. First come, first serve. while supplies last! Can only ship T-Shirts within the United State Send your postal address to stickers@softwaredefinedtalk.com (mailto:stickers@softwaredefinedtalk.com) and we will send Listener Feedback Justin Garrison told us the Kubecon Keynote mentioned on last week’s episode was by Julia Evans a.k.a @b0rk (https://twitter.com/b0rk) who works at Stripe and here’s a list of her talks (https://jvns.ca/talks/). CodeRanch Review by Rookie (https://coderanch.com/t/707185/Blatant-advert-Software-Defined-Podcast) SDT news & hype Join us in Slack (http://www.softwaredefinedtalk.com/slack). Send your postal address to stickers@softwaredefinedtalk.com (mailto:stickers@softwaredefinedtalk.com) and we will send you a free laptop sticker! Follow us on Twitter (https://twitter.com/softwaredeftalk), Instagram (https://www.instagram.com/softwaredefinedtalk/) or LinkedIn (https://www.linkedin.com/company/software-defined-talk/) Listen to the Software Defined Interviews Podcast (https://www.softwaredefinedinterviews.com/). Check out the back catalog (http://cote.coffee/howtotech/). Brandon built the Quick Concall iPhone App (https://itunes.apple.com/us/app/quick-concall/id1399948033?mt=8) and he wants you to buy it for $0.99. Recommendations Coté: U (https://www.uniqlo.com/us/en/men-heattech-crew-neck-long-sleeve-t-shirt-408111.html?dwvar_408111_color=COL02&cgid=)niqlo (https://www.uniqlo.com/us/en/men-heattech-crew-neck-long-sleeve-t-shirt-408111.html?dwvar_408111_color=COL02&cgid=) (https://www.uniqlo.com/us/en/men-heattech-crew-neck-long-sleeve-t-shirt-408111.html?dwvar_408111_color=COL02&cgid=)MEN HEATTECH EXTRA WARM LONG JOHNS (https://www.uniqlo.com/us/en/men-heattech-crew-neck-long-sleeve-t-shirt-408111.html?dwvar_408111_color=COL02&cgid=). Brandon: Big Little Lies (https://www.hbo.com/big-little-lies) Matt: Death’s End (https://www.amazon.com/Deaths-End-Remembrance-Earths-Past/dp/0765377101) by Liu Cixin
Over the last few days, we have heard stories about how a 10-year-old child was able to use their face to unlock their mother's phone. There were also stories about twins being able to do the same with their siblings iPhone. Although these quick headlines ensure a viral hit for tech websites with thousands of people hitting the share button, there is another inconvenient truth. Most hacks actually occur on the other side of authentication after you have entered your pin or unlocked your phone using facial recognition, which is something seldom talked about. I wanted to find an expert in biometrics and ID systems that was also passionate about identification as a critical tool for social and economic development. My quest led me to a company called BioCatch. BioCatch was founded in 2011 by experts in neural science research, machine learning, and cybersecurity. Today, they are leading the way with new innovations and helping to secure the world's largest banks and enterprises from next-generation cyber threats. As Vice president of BioCatch, Frances Zelazny works closely with the CEO to establish comprehensive marketing strategy, including brand positioning, messaging and execution. Armed with extensive experience with mobile payments, fintech, biometrics, and security technologies, I invited her on to the show to share her insights and expertise. There are many significant talking points on today's episode such as the CEO of Equifax stepping down following an epic data breach that left SSNs, driver’s license numbers and other sensitive info for 143 Million people vulnerable to hackers. Frances also highlights how India is building a biometric database for 1.3 billion people. This podcast episode highlights how we all need to understand that there is much more to biometric authentication than facial recognition on the new iPhone X.
Update on unfolding news regarding #EquifaxDataBreach & some available PreCautionary measures 2 secure SSNs & related data 4 our Families & us.Stay Safe,Be Blessed!
Auction professionals are responsible for large amounts of sensitive information, both for themselves and their clients. One of the keys to keeping that information safe online is implementing a system to handle passwords. In this episode, host Aaron Traffas talks about the requirements for creating good passwords and explores some of the features of a popular password management system. Subscribe on iTunes | Google Play | Stitcher Today’s SponsorsSharp Auction EngineBidWrangler Episode Links https://www.grc.com/haystack.htm http://www.auctioneertech.com The Fast Talking Podcast is a small business building podcast as seen through the lens of auctioneers and auction professionals. Focusing on social media, marketing strategies, finance, operations, human resources, and time management, we provide focused discussions on important topics weekly. ----- Episode 163: Transcription Hello and welcome to the Fast Talking Podcast. My name is Aaron Traffas and I'm excited to be your guest host for today's episode. Auctioneers are stewards of large amounts of sensitive information, both for ourselves and our clients, so today we're going to talk about the first step to keeping that information safe. I wrote the article that inspired this episode about a month ago on my auction technology blog at auctioneertech.com because I realized there are many of us who would like to do better when it comes to internet security. The tech news now seems to report, with increasing regularity, about massive database breaches of popular websites that expose all our passwords to the web. I'm going to talk today about what makes good passwords and go over the features of LastPass, which is one of the more popular password management systems available. Secure passwords The first requirement for proper password hygiene is a secure password. A secure password is one with enough entropy and length to resist brute force attacks. Now, let me explain what that means. Entropy, in this context, is the amount of randomness in a password. A password that comprises words in the dictionary has a very low entropy, while a password made up of random characters has high entropy. A brute force attack uses a powerful computer to try every possible combination of characters until it finds a match. Modern offline brute force attacks can attempt billions or even trillions of combinations each second, so it won't take very long to crack your password made up of your kids initials followed by your wedding date. Entropy is important because modern password cracking processes are smarter than just starting with A and then trying AB and then ABC. They use patterns derived from millions of leaked passwords to determine commonalities likely found in your password, and they try those first before moving on to more random combinations. Password length is important because it’s how we can easily make the brute-forcing process take much longer. Each character in the alphabet can be upper and lower case, which means that every letter we add forces an additional 52 attempts. Adding numbers and special characters to the password alphabet can increase the character depth to 92. We'll put the link in the show notes to the great Password Haystacks tool at grc.com/haystack that can analyze your password strength and length and tell you how long a brute force attack would take on the password you give it. Don’t worry – nothing is sent through the internet. It’s all done with your browser, which is important for reasons we’ll talk about shortly. Different passwords After making a password secure, the second part of proper password management is using a different password for each site or service. I mentioned earlier the myriad password leaks from major internet businesses in the last few years. The frequency of these leaks seems to be increasing. When passwords are leaked from one service, every user who used the same password on a different service is suddenly vulnerable. If every password you use is unique to each service, then a password breach only impacts your account at the service that was breached and you don't have to worry about attackers using your password from one site to gain access to your account on another site. Rotating password Now, I want to mention password rotation, which many people think is also important. If our password is one that we’ve reused on multiple sites, then the longer we use it, the better the chances are that it’ll have been involved in a breach of some service and is available to the hacking community. The reason some banks frustrate us by forcing us to change our passwords regularly is that it increases the likelihood that we're using a unique password that's not known by anybody else. But, if we make sure from the start that we use a different and secure password for each site, there’s not really any need to ever change our passwords. In my article, I used auction123 as an example of a bad password and had an example of a good password that was 64 characters long and full of gibberish that included braces, tildes, pipes and other punctuation that's not used every day. I'll also mention that a simple replacement of characters with punctuation - like changing an "S" to a dollar sign or an "A" to the at sign - is one of the first things that hackers try. As a general rule, if you can read your password to someone in under a minute, it's probably not a good password. LastPass Now that we've talked about why it's important to have a strong, long and different password for each site, it should be obvious that it's impossible to accomplish that without using a tool of some kind. I don't want this episode to be a commercial for LastPass, but I want to talk about some of the features that a password management system offers, and LastPass is both the one that I'm familiar with and the one that is most frequently recommended by the security experts I follow in the industry. There are others out there, like 1Password, KeePass and Dashlane, many of which offer similar features to what we're getting ready to talk about, and anything is probably better than nothing. To use LastPass, you install the mobile app on your phone and use extensions to your web browser on your computer. Once you've logged in to LastPass, it then logs you in everywhere else by automatically filling in the username and password for each site you visit and each app you use on your phone or tablet. Passwords are only the beginning, as you can store notes, SSNs, QR codes, images and credit card information completely securely. Shopping becomes much easier when you can have LastPass populate your credit card information and addresses into web forms. It features two-factor authentication, which is crucial to any security system. This means when you log in to LastPass, you can — and you should — make it require a separate security code from an app on your phone in addition to your master password. This means if someone ever gets your master password, he can't log in unless he also has your phone in his possession. The first time you log in to a site, it pops-up an option to automatically store that password so you never have to worry about it again. When you’re creating accounts, it generates extremely secure passwords so you don’t have the stress of having to come up with something yourself. It can also audit your security, letting you know which sites have weak or compromised passwords and offering you the ability to easily change them. For many sites, it can actually change your passwords for you to something much more secure. You can also share passwords securely with other LastPass users, which lets us share the ability to log in with employees without giving those employees the actual passwords. If an employee leaves, we simply turn off the sharing of that password with that user instead of having to actually change passwords to the different sites that employee was using. The best part about LastPass is that all your content — passwords, SSNs, notes and even images — is encrypted by your browser or the mobile app before it’s sent to the LastPass servers. LastPass never has access to the master password since it, too, is encrypted before it leaves your computer. Even if the LastPass servers are compromised, all a hacker would have access to is the encrypted data which is useless to anyone other than you, so long as your master password has enough entropy and length to prevent cracking. LastPass has a free plan, which is a great way for you to try it and see how it works. To sync your mobile devices and computer, though, you'll need to upgrade to LastPass Premium, which, in my opinion, at $1 per month, would be a steal at 10 times the price. Wrap-up In summary, proper password hygiene isn't hard. Make sure your passwords are long and free of patterns like words or dates. Make sure you don't reuse passwords on more than one site. In order to satisfy these two requirements, you need a password management system. If you don't have one, get one immediately. LastPass seems to be the one most recommended by the security community, but any system is better than no system. I'd like to thank Andy for giving me the opportunity to guest host the Fast Talking Podcast this week. The show is built for you, the fast talking nation. We're always looking for suggestions and feedback, so if you have an idea for great topic or guest you think would be a good fit, leave a comment on fasttalkingpodcast.com or find us @auctionpodcast on Twitter or facebook.com/fasttalkingpodcast. My blog is auctioneertech.com and if you'd like to contact me personally, find me on Twitter @traffas or, better yet, email aaron.traffas@purplewave.com With that, we want to thank you for gifting us with your time. As always, be sure to like, favorite and share this podcast in whichever venue you choose to listen. We enjoy creating this podcast for you and strive to share this industry we love with more and more people each week. I'm Aaron Traffas. Thanks for listening. Now go sell something.
Lilli started as a professional organizer. After years of working with physical clutter, she now uses her skills on disorganized computers. Her goal is to make your digital life simpler using technology. In this episode, Zack and Lilli talk about how to save time and securely organize your passwords using 1Password. In this episode, you will learn: Why having a variety of passwords is so important. How to start with a password manager. What to do when 1Password doesn't automatically save logins. Best way to share password databases with family members, team members, clients Other types of information to save in 1Passwords besides logins: Car VINs Credit Cards Bank Account info Drivers License Membership numbers Reward program numbers SSNs for all family members Software Licenses Turning on the 1Password fingerprint feature on your iPhone. Tips for creating a unique master password. Links and resources mentioned: Lilli's special coaching offer. https://1password.com/ https://www.lastpass.com/ https://www.dashlane.com/ Subscribe to the podcast on iTunes, Stitcher, Overcast, PocketCast or your favorite podcast player. It’s easy, you’ll get new episodes automatically, and it also helps the show gain exposure. The shownotes can be found at zacharysexton.com/3
Click Here Or On Above Image To Reach Our ExpertsSelling And Shopping Safely Online For Consumers And MerchantsDespite stability in the number of victims and losses last year, the ways that credit card fraud occurs have changed. With the switch to chip-enabled EMV cards in 2015, identity thieves are moving from cloning counterfeits of that existing plastic and, instead, are focusing on opening new fraudulent accounts with stolen Social Security numbers and other sensitive data.In its 2016 Identity Fraud Study, Javelin Strategy & Research reports that new-account fraud more than doubled in 2015 from the previous year — and with that 113 percent increase, it now accounts for one-fifth of all fraud losses.Meanwhile, using stolen credit card numbers on counterfeit clones for in-store shopping dropped by 4 percent but increased by 5 percent for fraudulent online purchases. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Other trends worth noting from Javelin's analysis, based on a survey of more than 5,000 consumers: More victims, fewer losses. More than 13 million Americans fell victim to identity fraud last year; that's up 3 percent from 2014 and the second highest number in the past six years. But losses decreased by 6 percent to $15 billion, the lowest amount since 2010. Overall, identity thieves have stolen $112 billion in the past six years — roughly $35,600 per minute, or enough to pay for four years of college in just four minutes.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Hacked here, used abroad. About 18 percent of identity fraud involves using stolen U.S. credit cards outside our borders. That amounts to $2.4 billion, with an average of $1,585 per incident. Because of government-mandated protections and zero percent liability policies offered by most providers, credit card companies, not their customers, typically eat those costs. Issuers are estimated to proactively detect two-thirds of these cases, according to Javelin.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)You may be your worst enemy. Consumers who say they don't trust their financial institutions fare worse: Their stolen information is used 75 percent longer by fraudsters, with expenses averaging 185 percent higher than those of customers who use services such as transaction monitoring and alerts, credit freezes and black-market monitoring.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)How To Protect Yourself1. Get A Credit Freeze. Once enacted, a credit (also known as a security) freeze restricts access to your credit report, which creditors check before issuing new financial or service accounts in your name. Without seeing your report, creditors won't approve accounts to ID thieves posing as you. A freeze must be placed with each of the three major credit-reporting bureaus — typically free for those 65 and older (state laws vary) — and can be unthawed when you are legitimately applying for credit.2. Secure Mobile Devices. If your financial life is on a smartphone or tablet, apply software updates that patch known vulnerabilities as soon as they become available. Use security features built into Android and iOS devices, such as passcode or biometric (fingerprint) protection, and programs that encrypt data and remotely wipe contents if the device is lost or stolen.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)3. Use Strong Passwords. They “remain the de facto first line of defense for most online accounts, which has motivated criminals to compromise them whenever possible,” Javelin notes. Using a password manager is a convenient way to maintain good password practices without resorting to writing these codes down, which could also place them at risk of physical compromise.4. Sign Up For Account Alerts. Offered by banks, credit card issuers and brokerages, these free notifications, via email or text message, provide you with real-time alerts of suspicious activity. When fraud occurs, contact the account issuer immediately.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)5. Take Data Breach Notifications Seriously. One in 5 data-breach victims suffered fraud in 2015, up from 1 in 7 in 2014. While data breaches at retailers remain an issue, the biggest jump in breaches was at government agencies and health care organizations, with a 64 percent rise in exposure of SSNs.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)
Topics covered Target CIO resigns, new central CISO and CCO roles created; but what's really going on here? - http://www.darkreading.com/attacks-breaches/target-begins-security-and-compliance-ma/240166451 & http://pressroom.target.com/news/target-reports-third-quarter-2013-earnings City of Detroit employees' information (including SSNs, DoB, etc) are "at risk" because someone clicked something they shouldn't have - http://www.freep.com/article/20140303/NEWS01/303030085/Detroit-computer-security-breach ComiXology was [big time] hacked, but it's all good because the passwords were 'cryptographically secured' but where's the transparency? - http://www.theregister.co.uk/2014/03/07/comixologys_phantom_zone_breached_by_evil_haxxor/ A North Dakota University System was hacked and now 290k students, employees and faculty (yes including SSNs) data is at risk ... or is it? - http://www.greenfieldreporter.com/view/story/8f909740809e48e9a5669de333418134/US--University-System-Hacked NC State researchers have a genius new way to detect Android malware (hint: you look for C code) - http://www.computerworld.com/s/article/9246825/N.C._State_researchers_devise_tool_that_detects_Android_malware The AARP (yes, that AARP) has decided that now is the time to post a bulletin to their system to teach retired persons how to make good passwords - http://www.aarp.org/home-family/personal-technology/info-2014/create-password-avoid-hacks-kirchheimer.viewall.html
Controversy at the Palms where generous promo sparks controversy, leads to firing of manager. Mason Malmuth attempts to control PFA content, bans Druff from 2+2. Full WSOP schedule announced, limit holdem again scaled down. PFA user reports unethical behavior on Full Flush Poker. Druff appears on Blu-Ray Extra for film "Runner, Runner". Don Johnson: Casino-crushing blackjack genius, or overhyped fraud? Insane multiple rebuys at 6-figure-buyin Aussie Million events. Tom Dwan having an "issue" with Full Tilt, claims to not feel comfortable playing there. Borgata cheater Christian Lusardi charged with bootlegging DVD's from China. Big cyber-attack against LV Sands website, displays employee names & SSNs! The odd tale of the 20-year-jackpot at MGM Grand. MtGox stops withdrawals due to alleged flaw in bitcoin system. badguy23 asks for the community's support during a tough time for Grandma Rosa. BeerAndPoker co-hosts the final 1/3 of the show.
Controversy at the Palms where generous promo sparks controversy, leads to firing of manager. Mason Malmuth attempts to control PFA content, bans Druff from 2+2. Full WSOP schedule announced, limit holdem again scaled down. PFA user reports unethical behavior on Full Flush Poker. Druff appears on Blu-Ray Extra for film "Runner, Runner". Don Johnson: Casino-crushing blackjack genius, or overhyped fraud? Insane multiple rebuys at 6-figure-buyin Aussie Million events. Tom Dwan having an "issue" with Full Tilt, claims to not feel comfortable playing there. Borgata cheater Christian Lusardi charged with bootlegging DVD's from China. Big cyber-attack against LV Sands website, displays employee names & SSNs! The odd tale of the 20-year-jackpot at MGM Grand. MtGox stops withdrawals due to alleged flaw in bitcoin system. badguy23 asks for the community's support during a tough time for Grandma Rosa. BeerAndPoker co-hosts the final 1/3 of the show.
This week, Dave and Gunnar talk about Batman, Acxiom as your personal data custodian, the TSA Pre-✓ Class War, and the HACK REACTOR. Subscribe via RSS or iTunes. Dave visits an abandoned amusement park in Chippewa Lake, OH which was featured in a 10 min documentary and was the filming location of Closed for the Season Gunnar needs a Dark Knight intervention When not listening to D&G: Windows XP apocalypse and your own countdown clock to April 8, 2014 Yahoo! doppelgängers KnowEm Tracks Down All the Sites You’ve Registered a Username Simply provide your name, address, birth date and last four digits of your Social Security Number: Data Broker Acxiom’s New Site Allows Users To View And Edit The Marketing Info It’s Collected How Apple and Amazon Security Flaws Led to My Epic Hacking Great for converting lists of SSNs and photos of birth certificates: CloudConvert Converts Almost Any File Type Between Formats The TSA Racket is Now Selling Your Basic Rights Back to You TSA screening about to get a lot worse When not taking Klingon MOOCs: Apocalypse 101: Take the Free Walking Dead Online Course From UC Irvine New Walking Dead Spinoff Coming to AMC in 2015 Inside Hack Reactor, The Coding Bootcamp That Wants To Be The CS Degree Of The Future Google Releases Raspberry Pi Web Dev Teaching Tool, or spend less time yak shaving and learn web programming right away with OpenShift HT Major Hayden: Yahoo’s Mayer gives phone passcodes a pass Replay of GovLoop’s How to Securely Deploy Open Source Software featuring David A. Wheeler, Josh Davis, and Dave Dave was a panelist with friend of the show Dan Risacher at GovLoop’s Agency of the Future event NC Datapalooza was fantastic. Gunnar presenting at NIST Cloud Computing and Mobility workshop on October 1-3 Dave as panelist at Symantec Government Symposium on October 2 Gartner ITxpo on October 6-10 Red Hat Government Symposium registration now open! Red Hat Software Collections and Red Hat Developer Toolset 2.0 are GA! HT @RedHatOpen: Emulate a Common Access Card in a VM by using certificates generated on the host Two factor auth site of the week is GitHub who has a nice security history page Technical Debt & Vendor Lock-In by friend of the show Matt Micene of DLT State of Texas wants $11 to receive updated address info Get hooked on a feeling with D&G’s word of the week: Haptography Cutting Room Floor Box.net now “NSA-proof” OpenID vs IndieAuth Great photo of Sealand, courtesy of Gunnar’s mom Tweet2Cite: APA- and MLA-compliant citations for your toots Perfect for regional jets: USB powered soldering iron Epic blockbuster trailer: Monty Python and the Holy Grail A scientific guide to saying “no”: How to avoid temptation and distraction Legal advice if you want to be a superhero in San Diego Send your teeth to the Tooth Fairy using a RaspberryPi and pneumatic tubes CERN Lecture Belt for the punishing environments of today’s physics lecture circuit We Give Thanks Matt Micene for helping us stay technically debt free David A. Wheeler, Josh Davis, and Dan Risacher for advocating open source in the DoD
We show that Social Security numbers (SSNs) can be accurately predicted from widely available public data, such as individuals' dates and states of birth. Using only publicly available information, we observed a correlation between individuals' SSNs and their birth data, and found that for younger cohorts the correlation allows statistical inference of private SSNs, thereby heightening the risks of identity theft for millions of US residents. The inferences are made possible by the public availability of the Social Security Administration's Death Master File and the widespread accessibility of personal information from multiple sources, such as data brokers or profiles on social networking sites. Our results highlight the unexpected privacy consequences of the complex interactions among multiple data sources in modern information economies, and quantify novel privacy risks associated with information revelation in public forums. They also highlight how well-meaning policies in the area of information security can backfire, because of unanticipated interplays between policies and diverse sources of personal data.
Here are the shownotes for episode #30 for the Global Geek News Podcast. Global Geek News #30 Podcast Feed: * Google announces Chrome OS for netbooks * Amazon killing mobile apps that use its product data * Rumor: Amazon looking to buy Netflix * New algorithm guesses SSNs with your birth date and birth place * Chegg allows you to rent textbooks Netflix style * P2P collection costs man huge fine, suspended jail sentence * Judge rules P2P sites legal and should be presumed innocent * Teenagers losing interest in illegal file-sharing as streaming gains momentum * Assaulted by somebody you met online? Don't sue the website * Teenager falls down a manhole while texting and walking Host: Jeremy Bray & Wesley Faulkner
Here are the shownotes for episode #30 for the Global Geek News Podcast. Global Geek News #30 Podcast Feed: * Google announces Chrome OS for netbooks * Amazon killing mobile apps that use its product data * Rumor: Amazon looking to buy Netflix * New algorithm guesses SSNs with your birth date and birth place * Chegg allows you to rent textbooks Netflix style * P2P collection costs man huge fine, suspended jail sentence * Judge rules P2P sites legal and should be presumed innocent * Teenagers losing interest in illegal file-sharing as streaming gains momentum * Assaulted by somebody you met online? Don't sue the website * Teenager falls down a manhole while texting and walking Host: Jeremy Bray & Wesley Faulkner